START lib/libssl/interop 2025-01-14T10:24:36Z ===> libressl ==== run-self-client-server ==== cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../client.c cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../util.c cc -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../server.c cc -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ...................................................................................................................................... ................... writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd client >ldd-client.out # check that client is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-client.out grep -q /usr/lib/libssl.so ldd-client.out # check that client is not linked with OpenSSL ! grep /usr/local/lib/ ldd-client.out ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' client-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 4.0.0 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd server >ldd-server.out # check that server is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-server.out grep -q /usr/lib/libssl.so ldd-server.out # check that server is not linked with OpenSSL ! grep /usr/local/lib/ ldd-server.out ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' server-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 4.0.0 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> openssl11 ==== run-self-client-server ==== cc -O2 -pipe -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../client.c cc -O2 -pipe -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../util.c cc -L /usr/local/lib/eopenssl11 -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../server.c cc -L /usr/local/lib/eopenssl11 -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .................... ........................... writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd client >ldd-client.out # check that client is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w 11 Sep 2023 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd server >ldd-server.out # check that server is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1w 11 Sep 2023 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> openssl31 Run "pkg_add openssl--%3.1" to run tests against OpenSSL 3.1 SKIPPED ===> openssl32 ==== run-self-client-server ==== cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../client.c cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../util.c cc -L /usr/local/lib/eopenssl32 -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -DOPENSSL_SUPPRESS_DEPRECATED -g -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl32 -c /usr/src/regress/lib/libssl/interop/openssl32/../server.c cc -L /usr/local/lib/eopenssl32 -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ............................................... ................................................................................................. writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ldd client >ldd-client.out # check that client is linked with OpenSSL 3.2 grep -q /usr/local/lib/eopenssl32/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl32/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 3.2 grep 'SSLEAY_VERSION: OpenSSL 3.2' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 3.2.3 3 Sep 2024 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 3.2 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ldd server >ldd-server.out # check that server is linked with OpenSSL 3.2 grep -q /usr/local/lib/eopenssl32/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl32/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 3.2 grep 'SSLEAY_VERSION: OpenSSL 3.2' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 3.2.3 3 Sep 2024 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # wait for server to terminate sed -n 's/listen sock: //p' server-self.out | xargs nc 2>/dev/null *** Error 123 in target 'run-self-client-server' (ignored) # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 3.2 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> netcat ==== run-netcat-client-libressl-server-nc ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .......................................... .............................................................. writing new private key to '127.0.0.1.key' ----- echo "greeting" | nc >server-netcat-client-libressl-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-netcat-client-libressl-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-libressl-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-libressl-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-libressl-server-nc.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-openssl11-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl11-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-netcat-client-openssl11-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl11-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl11-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl11-server-nc.out ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-openssl32-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl32-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-netcat-client-openssl32-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl32-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl32-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl32-server-nc.out ==== run-protocol-client-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl32-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-nc-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-netcat-client-nc-server-libressl.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-libressl.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-libressl.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-libressl.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-libressl.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-libressl.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-libressl.out ==== run-netcat-client-nc-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-netcat-client-nc-server-openssl11.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl11.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl11.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl11.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl11.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl11.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl11.out ==== run-netcat-client-nc-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-netcat-client-nc-server-openssl32.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl32.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl32.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl32.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl32.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl32.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl32.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-protocol-client-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl32-server-nc.out Protocol : TLSv1.3 ==== run-protocol-server-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-libressl.out Protocol : TLSv1.3 ==== run-protocol-server-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl11.out Protocol : TLSv1.3 ==== run-protocol-server-openssl32 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl32.out Protocol : TLSv1.3 ===> session ==== run-session-client-libressl-server-libressl ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .............................................. ....................................... writing new private key to '127.0.0.1.key' ----- # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-libressl-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl11-server-libressl ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl11-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ===> botan ==== run-client-botan-server-libressl ==== c++ -I/usr/local/include/botan-2 -Wall -MD -MP -c /usr/src/regress/lib/libssl/interop/botan/client.cpp c++ -L/usr/local/lib -o client client.o -lbotan-2 /usr/local/bin/botan keygen >ca.key.tmp mv ca.key.tmp ca.key /usr/local/bin/botan gen_self_signed ca.key ca >ca.crt.tmp --organization=tls-regress --ca mv ca.crt.tmp ca.crt /usr/local/bin/botan keygen >server.key.tmp mv server.key.tmp server.key /usr/local/bin/botan gen_pkcs10 server.key localhost >server.req.tmp --organization=tls-regress --dns=127.0.0.1 mv server.req.tmp server.req /usr/local/bin/botan sign_cert ca.crt ca.key server.req >server.crt.tmp mv server.crt.tmp server.crt LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-libressl.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-libressl.out` # check that the server child run successfully to the end grep -q '^success$' server-libressl.out || { sleep 1; grep -q '^success$' server-libressl.out; } # server must have read client hello grep -q '^<<< hello$' server-libressl.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-libressl.out ==== run-client-botan-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-openssl11.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-openssl11.out` # check that the server child run successfully to the end grep -q '^success$' server-openssl11.out || { sleep 1; grep -q '^success$' server-openssl11.out; } # server must have read client hello grep -q '^<<< hello$' server-openssl11.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-openssl11.out ==== run-client-botan-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-openssl32.out -c server.crt -k server.key 127.0.0.1 0 ./client >client-botan.out -C ca.crt 127.0.0.1 `sed -n 's/listen sock: 127.0.0.1 //p' server-openssl32.out` # check that the server child run successfully to the end grep -q '^success$' server-openssl32.out || { sleep 1; grep -q '^success$' server-openssl32.out; } # server must have read client hello grep -q '^<<< hello$' server-openssl32.out # check that the client run successfully to the end grep -q '^success$' client-botan.out # client must have read server greeting grep -q '^<<< greeting$' client-botan.out # currently botan supports TLS 1.2, adapt later grep -q ' Protocol *: TLSv1.2$' server-openssl32.out ===> version ==== run-version-client-libressl-any-server-libressl-any ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ........ ....................................................... writing new private key to '127.0.0.1.key' ----- LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-any.out ==== check-version-client-libressl-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-libressl-any.out ==== run-version-client-libressl-any-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-any.out ==== check-version-client-libressl-any-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-openssl11-any.out ==== run-version-client-openssl11-any-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-any.out ==== check-version-client-openssl11-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-libressl-any.out ==== run-version-client-libressl-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_2.out ==== check-version-client-libressl-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-any-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_2.out ==== check-version-client-libressl-any-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_2.out ==== check-version-client-openssl11-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-any.out ==== check-version-client-libressl-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-any.out ==== check-version-client-libressl-TLS1_2-server-openssl11-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-any.out ==== run-version-client-openssl11-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-any.out ==== check-version-client-openssl11-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-openssl11-any-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-any-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-openssl11-any.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-any.out` grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-any.out; } grep -q '^success$' client-version-client-openssl11-any-server-openssl11-any.out ==== check-version-client-openssl11-any-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-openssl11-any.out ==== run-version-client-openssl11-any-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-any-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-openssl11-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-any-server-openssl11-TLS1_2.out ==== check-version-client-openssl11-any-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-any-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-any-server-openssl11-TLS1_2.out ==== run-version-client-openssl11-TLS1_2-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-any.out ==== check-version-client-openssl11-TLS1_2-server-openssl11-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-openssl11-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-openssl11-any.out ==== run-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out ==== check-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-openssl11-TLS1_2.out ===> cipher LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client -l ALL -L >client-libressl.ciphers.tmp sed -n 's/^cipher //p' client-libressl.ciphers rm client-libressl.ciphers.tmp openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ............................................... ...................................................................................................... writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key ............................. ................ writing new private key to 'ca.key' ----- openssl dsaparam -genkey -out dsa.key 2048 Generating DSA parameters, 2048 bit long prime This could take some time ..................................................* ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................* openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost/ -nodes -key dsa.key -out dsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in dsa.req -out dsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost openssl ecparam -genkey -name secp256r1 -out ec.key using curve name prime256v1 instead of secp256r1 openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ec/CN=localhost/ -nodes -key ec.key -out ec.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in ec.req -out ec.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=ec/CN=localhost openssl genrsa -out rsa.key 2048 Generating RSA private key, 2048 bit long modulus ........ ................................ e is 65537 (0x010001) openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost/ -nodes -key rsa.key -out rsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in rsa.req -out rsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server -l ALL -L >server-libressl.ciphers.tmp sed -n 's/^cipher //p' server-libressl.ciphers rm server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-libressl.ciphers client-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers rm client-libressl-server-libressl.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server -l ALL -L >server-openssl11.ciphers.tmp sed -n 's/^cipher //p' server-openssl11.ciphers rm server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl11.ciphers >client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl11.ciphers client-libressl.ciphers >client-libressl-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers rm client-libressl-server-openssl11.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server -l ALL -L >server-openssl32.ciphers.tmp sed -n 's/^cipher //p' server-openssl32.ciphers rm server-openssl32.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl32.ciphers >client-libressl-server-openssl32.ciphers.tmp uniq -d client-libressl-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl32.ciphers client-libressl.ciphers >client-libressl-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-libressl-server-openssl32.ciphers.tmp uniq -d client-libressl-server-openssl32.ciphers rm client-libressl-server-openssl32.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client -l ALL -L >client-openssl11.ciphers.tmp sed -n 's/^cipher //p' client-openssl11.ciphers rm client-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-libressl.ciphers client-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers rm client-openssl11-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl11.ciphers >client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl11.ciphers client-libressl.ciphers >client-openssl11-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers rm client-openssl11-server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl32.ciphers >client-openssl11-server-openssl32.ciphers.tmp uniq -d client-openssl11-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl32.ciphers client-libressl.ciphers >client-openssl11-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl11-server-openssl32.ciphers.tmp uniq -d client-openssl11-server-openssl32.ciphers rm client-openssl11-server-openssl32.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client -l ALL -L >client-openssl32.ciphers.tmp sed -n 's/^cipher //p' client-openssl32.ciphers rm client-openssl32.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-libressl.ciphers >client-openssl32-server-libressl.ciphers.tmp uniq -d client-openssl32-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-libressl.ciphers client-libressl.ciphers >client-openssl32-server-libressl.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-libressl.ciphers.tmp uniq -d client-openssl32-server-libressl.ciphers rm client-openssl32-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-openssl11.ciphers >client-openssl32-server-openssl11.ciphers.tmp uniq -d client-openssl32-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-openssl11.ciphers client-libressl.ciphers >client-openssl32-server-openssl11.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-openssl11.ciphers.tmp uniq -d client-openssl32-server-openssl11.ciphers rm client-openssl32-server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl32.ciphers server-openssl32.ciphers >client-openssl32-server-openssl32.ciphers.tmp uniq -d client-openssl32-server-openssl32.ciphers # we are only interested in ciphers supported by libressl sort client-openssl32-server-openssl32.ciphers client-libressl.ciphers >client-openssl32-server-openssl32.ciphers.tmp # OpenSSL's SSL_CTX_set_cipher_list doesn't accept TLSv1.3 ciphers sed -i '/^TLS_/d' client-openssl32-server-openssl32.ciphers.tmp uniq -d client-openssl32-server-openssl32.ciphers rm client-openssl32-server-openssl32.ciphers.tmp rm -f ciphers.mk ciphers.mk.tmp echo 'CIPHERS_libressl_libressl =' >>ciphers.mk.tmp `cat client-libressl-server-libressl.ciphers` echo 'CIPHERS_libressl_openssl11 =' >>ciphers.mk.tmp `cat client-libressl-server-openssl11.ciphers` echo 'CIPHERS_libressl_openssl32 =' >>ciphers.mk.tmp `cat client-libressl-server-openssl32.ciphers` echo 'CIPHERS_openssl11_libressl =' >>ciphers.mk.tmp `cat client-openssl11-server-libressl.ciphers` echo 'CIPHERS_openssl11_openssl11 =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl11.ciphers` echo 'CIPHERS_openssl11_openssl32 =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl32.ciphers` echo 'CIPHERS_openssl32_libressl =' >>ciphers.mk.tmp `cat client-openssl32-server-libressl.ciphers` echo 'CIPHERS_openssl32_openssl11 =' >>ciphers.mk.tmp `cat client-openssl32-server-openssl11.ciphers` echo 'CIPHERS_openssl32_openssl32 =' >>ciphers.mk.tmp `cat client-openssl32-server-openssl32.ciphers` mv ciphers.mk.tmp ciphers.mk ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== openssl dhparam -out dh.param 1024 Generating DH parameters, 1024 bit long safe prime, generator 2 This is going to take a long time .......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................* LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-libressl.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-libressl.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-libressl.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-libressl.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -l DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l EDH-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l EDH-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-SHA-client-libressl-server-libressl.out -l RC4-SHA `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_AES_128_GCM_SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out -l TLS_AES_128_GCM_SHA256 `sed -n 's/listen sock: //p' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out ==== check-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' client-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_AES_128_GCM_SHA256$' server-cipher-TLS_AES_128_GCM_SHA256-client-libressl-server-libressl.out ==== run-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_AES_256_GCM_SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out -l TLS_AES_256_GCM_SHA384 `sed -n 's/listen sock: //p' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out ==== check-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-TLS_AES_256_GCM_SHA384-client-libressl-server-libressl.out ==== run-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l TLS_CHACHA20_POLY1305_SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out -l TLS_CHACHA20_POLY1305_SHA256 `sed -n 's/listen sock: //p' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out ==== check-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' client-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: TLS_CHACHA20_POLY1305_SHA256$' server-cipher-TLS_CHACHA20_POLY1305_SHA256-client-libressl-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl11.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl11.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl11.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl11.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl32.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl32.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl32.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl32.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl32.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-libressl.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-libressl.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-libressl.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-libressl.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-libressl.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-libressl.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-libressl.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-libressl.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl11.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl11.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-AES256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-AES256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-openssl32.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-openssl32.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-AES256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-AES256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-openssl32.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-openssl11.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-openssl11.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-AES256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-AES256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA-client-openssl32-server-openssl32.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA-client-openssl32-server-openssl32.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-AES256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-AES256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-AES256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl32-server-openssl32.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32 ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out # generic server cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl32-server-openssl32.out ===> cert ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ................................................ .......... writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key .. .............................. writing new private key to 'ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout fake-ca.key -x509 -out fake-ca.crt Generating a 2048 bit RSA private key .................................................. .. writing new private key to 'fake-ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=client/CN=localhost/ -nodes -newkey rsa -keyout client.key -out client.req Generating a 2048 bit RSA private key ........... ................. writing new private key to 'client.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in client.req -out client.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=client/CN=localhost openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.key -out server.req Generating a 2048 bit RSA private key .......................... ... writing new private key to 'server.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=server/CN=localhost LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 136386123432:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 5800004572840:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 9416026666664:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 11738892723880:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 17068685362856:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 15924807206568:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 9336724854440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 9969726191272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 10565498271400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7476627564200:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 5777851078312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 9347140273832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 4112807384744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16389708494504:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 12271234811560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 906743387816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 17536592111272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6303680456360:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 6195623421608:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 7924426708648:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 17601769891496:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 10060235998888:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 3105320199848:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 7347510691496:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 14370075322024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 2811439064744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 1503509952168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5096588023464:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out` 7472861832872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 252680853160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 11691269555880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6699887216296:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 7209874691752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 13767222302376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 3097431402152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3401885755048:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 10136993089192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3817865422504:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 13348130018984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 2380101064360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 15711549879976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 8855868581544:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 2515277231784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 8219642410664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 12171677570728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 2892722869928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 1564079699624:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12128217777832:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out` 6649515435688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 11252358121128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 17254318175912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5272403175080:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 10534242412200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 17382870972072:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 8787583911592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11047526151848:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out` 9871290984104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 4454237021864:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 7529997002408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 13262201579176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 9034682328744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2269044704936:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 3150960400040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 5551828608680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out` 4046166111912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 5365325366952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 103578617512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4614625801896:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out` 12667792287400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out` 3956265588392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out` 1556462630568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7390647215784:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out` 419880556200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 8890623850152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 14046627804840:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7709406480040:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 11565774505640:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 803109807784:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 12259233810088:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 1039718008488:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 3262485018280:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 8786727351976:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 11153069164200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 4230316627624:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 3498477819560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16565468800680:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 228838020776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 713849185960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 11671436334760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8121153455784:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 7423294871208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 11027660125864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 244187072168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10893591537320:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 1774395860648:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 7712908203688:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1468723029672:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 5718554822312:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 13225692739240:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 659706570408:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 7747400742568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 2116780054184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 7316661065384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12840353744552:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out` 17090703476392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 7074409154216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 8243655587496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11291367429800:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 12509032515240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 11496259610280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 16246297167528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8571872671400:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 12159834580648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 1687457519272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 12760095086248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9535393490600:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out` 4959874250408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 1179212363432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 6628760532648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7142364632744:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 9555345594024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 7221671851688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 10386893084328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 2565187655336:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out` 14954975528616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 12024760067752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 16683304322728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5113913816744:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out` 3104317200040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out` 15721024050856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out` 9337106564776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6381135218344:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out` 2700027537064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 573435340456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 6510293214888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1893473998504:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 14512435418792:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 11461502998184:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 14831978985128:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 12257892968104:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 6459312576168:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 16296788735656:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 11795152541352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 5663908787880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 1038935565992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15384441890472:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 1233843304104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 11055092766376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 15720587331240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10705036588712:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 10225337956008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 6112351987368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 6082627638952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12664677635752:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 1255825692328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 13150790223528:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 7401591314088:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 7529463416488:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 3371468564136:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 13049343440552:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 10264782915240:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10264782915240:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10264782915240:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10264782915240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 5398962497192:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5398962497192:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5398962497192:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5398962497192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 5818457188008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5818457188008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5818457188008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5818457188008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3701499852456:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 8985573340840:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8985573340840:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8985573340840:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8985573340840:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 15858251114152:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15858251114152:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15858251114152:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15858251114152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 10241787102888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10241787102888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10241787102888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10241787102888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15320880477864:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 3167394207400:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3167394207400:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3167394207400:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3167394207400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 5967895172776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5967895172776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5967895172776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5967895172776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 10517367469736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10517367469736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10517367469736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10517367469736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7883836409512:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 10472350033576:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10472350033576:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10472350033576:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10472350033576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 6253988517544:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2222776772264:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 4584478656168:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4584478656168:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 4584478656168:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4584478656168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 10432867997352:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 10432867997352:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 10432867997352:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10432867997352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 8622268057256:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8622268057256:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8622268057256:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8622268057256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 2108573976232:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 10486630147752:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 1420687943336:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1420687943336:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1420687943336:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1420687943336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 12841352754856:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 12841352754856:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 12841352754856:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12841352754856:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 13096713410216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 3825157940904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 3872030009000:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 17351342290600:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 12166161209000:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 11881602492072:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 6581949638312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8874508138152:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 12183913154216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 13571497965224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 11432714884776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15702162548392:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 16211724142248:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16211724142248:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16211724142248:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16211724142248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 13681488516776:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 16866197198504:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16866197198504:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16866197198504:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16866197198504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 11347965298344:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 11347965298344:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 11347965298344:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11347965298344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 12020236986024:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12020236986024:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12020236986024:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12020236986024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 13739831699112:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 9004628072104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9004628072104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 09004628072104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9004628072104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 974099617448:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0974099617448:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 974099617448:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 974099617448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 6565512406696:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6565512406696:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6565512406696:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6565512406696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 11756510406312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11756510406312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11756510406312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11756510406312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 7256209413800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7256209413800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7256209413800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7256209413800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13093024491176:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 14864378853032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14864378853032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14864378853032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14864378853032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 2615228393128:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2615228393128:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2615228393128:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2615228393128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 13497603622568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13497603622568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13497603622568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13497603622568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13510079637160:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 9470563710632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9470563710632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9470563710632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9470563710632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 2665365640872:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2665365640872:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2665365640872:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2665365640872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 13030961829544:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13030961829544:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13030961829544:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13030961829544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15220900214440:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 1931934082728:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 7171118790312:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 7751366350504:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 11188363667112:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 10377586521768:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 10977118181032:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 5549510817448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 530817361576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 14887992080040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16967959037608:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 10628339390120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 7124349290152:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 9097953466024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 15501062375080:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 578025477800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 13546447034024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 9971123377832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8270973609640:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 16371741632168:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 8152914413224:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 7914178983592:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 4991987050152:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 12866070808232:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 4240431716008:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 80399144616:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 5572556830376:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 5853929023144:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 8363877701288:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 12956803647144:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 5446831957672:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 2513861744296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 12593054168744:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 11707351168680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 13722469050024:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 15235878327976:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 11405939422888:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 1543196948136:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 15913031194280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 1771520988840:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 12396227765928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 126644700840:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11907632584360:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out` 10761395689128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 15680368174760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 9897529689768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4653583709864:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 2526208120488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 6258259527336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 1868875671208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5132944610984:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out` 9346444064424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15620142966440:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 7430356256424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out` 12176400643752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 924734928552:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 11135342687912:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 16413371676328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 7153178347176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out` 8231439414952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 17296113325736:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: 9224640546472:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 4185669367464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out` 2800481105576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 14125097948840:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 11282351421096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 5873007285928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 14018328377000:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 4005340624552:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 4323914712744:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 17006783960744:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 11714992428712:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 692678518440:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 12232887604904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 2188543678120:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 8044285236904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12577981466280:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 9899761600168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 1116518987432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 11564476794536:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10533303961256:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 7812367959720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 3587434706600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 6565989824168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6901676218024:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 966215583400:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 9154281838248:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1668638811816:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 12403665802920:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 3717670397608:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 14260130801320:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 13088712701608:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2059063875240:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 13460612810408:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 11454014166696:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 10580858140328:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-ca-cert-certverify.out` 8231846872744:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 2315462399656:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 8903717824168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 3652526290600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1831638849192:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out` 15718998341288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 5116759467688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 17567063553704:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12356180489896:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 5754604357288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 561966962344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 6725027526312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13943423682216:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 15767826323112:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 12989564352168:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 8420619945640:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 390438848168:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 2800310773416:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 4936505554600:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 12675306010280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 12446953928360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 6954383877800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10240632534696:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 17529477580456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 14338722006696:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 12999236839080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 878279075496:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 8686952203944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 9885108111016:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 1667463386792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7588603938472:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 915011323560:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 282797287080:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 12088986142376:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 4458686486184:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 12783330268840:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 3676758849192:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 740255295144:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 14503558186664:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 4271786469032:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 16603493471912:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 1613343819432:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 2643597354664:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 5119786509992:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5119786509992:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5119786509992:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5119786509992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 8302999180968:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 9131750549160:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 4792084428456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4792084428456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 4792084428456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4792084428456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4792084428456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4792084428456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4792084428456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 7786879039144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 7786879039144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7786879039144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7786879039144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7786879039144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7786879039144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7786879039144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 11528762242728:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11528762242728:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11528762242728:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11528762242728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 9118663567016:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15029480257192:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: 13371165406888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: SSL_read 0 13371165406888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13371165406888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13371165406888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13371165406888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13371165406888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13371165406888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 10140870878888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 010140870878888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10140870878888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10140870878888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10140870878888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10140870878888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10140870878888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 7961348728488:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 5749578098344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 10067304752808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6719557023400:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 4687108646568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 4499878770344:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 16998310819496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8042361910952:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 13795557811880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 14708883519144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 3272079820456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 16286740952744:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 15810599769768:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15810599769768:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15810599769768:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15810599769768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15633104783016:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 7271824942760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7271824942760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7271824942760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7271824942760:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7271824942760:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7271824942760:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7271824942760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out` 7754960115368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 7754960115368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 7754960115368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7754960115368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7754960115368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7754960115368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7754960115368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 16971283101352:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16971283101352:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16971283101352:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16971283101352:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2054882617000:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 8491436172968:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8491436172968:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 8491436172968:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8491436172968:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8491436172968:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8491436172968:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8491436172968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 15509700708008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 15509700708008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 15509700708008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15509700708008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15509700708008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15509700708008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15509700708008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 2335357949608:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2335357949608:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2335357949608:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2335357949608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3245954254504:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 16867612358312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 16867612358312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16867612358312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16867612358312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16867612358312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16867612358312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16867612358312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 4896671848104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 04896671848104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4896671848104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4896671848104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4896671848104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4896671848104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4896671848104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 2627923793576:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2627923793576:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2627923793576:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2627923793576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 2350458947240:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 15156124657320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15156124657320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15156124657320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15156124657320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15156124657320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15156124657320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15156124657320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 3258877322920:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3258877322920:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3258877322920:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3258877322920:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3258877322920:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3258877322920:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3258877322920:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 9482647234216:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2551697139368:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 10256286369448:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 10355158853288:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 2174607562408:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 8439593547432:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 11985982715560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 14316266714792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 7093756425896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11112897787560:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 10009319306920:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 5102233433768:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 5836001515176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5643558209192:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 3288746415784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 10018561324712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 6528993281704:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6329439262376:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 13767024658088:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 4061958723240:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 7673003849384:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 8511769487016:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 12203743184552:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-noca-cert-certverify.out` 5380075505320:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 12829249840808:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12829249840808:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12829249840808:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12829249840808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 554215061160:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 554215061160:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 554215061160:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 554215061160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 15654725891752:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15654725891752:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15654725891752:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15654725891752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 5714075731624:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 11649063515816:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11649063515816:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11649063515816:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11649063515816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 2195974223528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2195974223528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2195974223528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2195974223528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 5565823592104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5565823592104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5565823592104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5565823592104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7453118588584:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 12244239996584:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12244239996584:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12244239996584:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12244239996584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 11531408639656:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11531408639656:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11531408639656:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11531408639656:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 5490774865576:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5490774865576:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5490774865576:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5490774865576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1529539081896:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 17283162670760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 4027668899496:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 17431180158632:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 017431180158632:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17431180158632:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17431180158632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 17343480452776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17343480452776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17343480452776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17343480452776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 13706608858792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 3924923414184:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 15614392600232:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 15614392600232:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 15614392600232:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15614392600232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 4947835623080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4947835623080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 4947835623080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4947835623080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 6993598387880:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 14291047270056:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 8827714897576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1120731354792:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 16497743001256:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 3999014938280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 3863820605096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11380167304872:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 15624670221992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 9163120715432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 5955090233000:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6070292006568:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 10719846377128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 58988881576:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 6398022006440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6398022006440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6398022006440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6398022006440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 4620022638248:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 4620022638248:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4620022638248:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4620022638248:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 11804385273512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 10327526319784:error:1404C418:SSL routines:ST_OK:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 48 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 472282150568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 472282150568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 472282150568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 472282150568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 11570287953576:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11570287953576:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 11570287953576:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11570287953576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 11560452503208:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11560452503208:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11560452503208:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11560452503208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 15056759387816:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15056759387816:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15056759387816:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15056759387816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 15752271890088:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15752271890088:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15752271890088:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15752271890088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10650222057128:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 12375290951336:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12375290951336:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12375290951336:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12375290951336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 16503107720872:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16503107720872:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16503107720872:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16503107720872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 10562903856808:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10562903856808:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10562903856808:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10562903856808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7018782385832:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 8363305002664:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8363305002664:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8363305002664:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8363305002664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 8729224402600:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8729224402600:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 8729224402600:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8729224402600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 10056718816936:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10056718816936:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10056718816936:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10056718816936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 12751275398824:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 16468107478696:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 10985958340264:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1822352307880:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 2948675897000:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 9093722838696:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 610714539688:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 13689903482536:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 14113161623208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 16573502445224:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 7730328581800:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 18696468136:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 14634786096808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 10052540077736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11544666760872:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 14344309036712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 9356773656232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 811755804328:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14798083991208:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 939375249064:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 4916215621288:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 12564807923368:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 12642107328168:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 2740300093096:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-ca-cert-certverify.out` 7050711832232:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 7592205829800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7592205829800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7592205829800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7592205829800:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7592205829800:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7592205829800:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7592205829800:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 3472030287528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3472030287528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3472030287528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3472030287528:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3472030287528:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3472030287528:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3472030287528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 14189202146984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14189202146984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14189202146984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14189202146984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14189202146984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14189202146984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14189202146984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4915581019816:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 16909118457512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16909118457512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16909118457512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16909118457512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16909118457512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16909118457512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16909118457512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 13939655853736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13939655853736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13939655853736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13939655853736:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13939655853736:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13939655853736:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13939655853736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 15906237175464:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15906237175464:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15906237175464:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15906237175464:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15906237175464:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15906237175464:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15906237175464:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 226929723048:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 11867641026216:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11867641026216:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11867641026216:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11867641026216:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11867641026216:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11867641026216:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11867641026216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 9515309020840:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9515309020840:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9515309020840:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9515309020840:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9515309020840:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9515309020840:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9515309020840:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 16004575844008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16004575844008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16004575844008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16004575844008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16004575844008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16004575844008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16004575844008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 2478094116520:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9017059378856:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 9730866632360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 3671654885032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 10148131505832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4880230201000:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 10539588503208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 17354888271528:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 15997024245416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 8491301975720:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 2968483120808:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 9897290950312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 13390036174504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14053768717992:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 10173154707112:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10173154707112:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10173154707112:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10173154707112:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10173154707112:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10173154707112:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10173154707112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 7165363951272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7165363951272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7165363951272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7165363951272:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7165363951272:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7165363951272:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7165363951272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 17213726549672:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17213726549672:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17213726549672:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17213726549672:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17213726549672:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17213726549672:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17213726549672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11903160596136:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 10103211251368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10103211251368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10103211251368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10103211251368:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10103211251368:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10103211251368:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10103211251368:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 759051138728:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 759051138728:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 759051138728:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 759051138728:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 759051138728:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 759051138728:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 759051138728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 7707090024104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7707090024104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7707090024104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7707090024104:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7707090024104:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7707090024104:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7707090024104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9488373155496:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 11771526928040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11771526928040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11771526928040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11771526928040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11771526928040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11771526928040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11771526928040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 11985293842088:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11985293842088:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11985293842088:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11985293842088:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 11985293842088:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 11985293842088:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 11985293842088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 9237819365032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9237819365032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9237819365032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9237819365032:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 9237819365032:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 9237819365032:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 9237819365032:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6330763101864:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 7377260230312:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 2512372606632:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1944200267432:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 6183938229928:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 1257075926696:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 7689195460264:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 1244481234600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 3777282094760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 3026170144424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11564414273192:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 11774069237416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 4730574112424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 11810332178088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 1799624357544:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 12360953652904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 12134709421736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 9789963138728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13471099487912:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 5503495358120:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 13545978353320:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 1755275093672:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 16036346201768:error:1404C45C:SSL routines:ST_OK:tlsv13 alert certificate required:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 13914925762216:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 10795039860392:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:889: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 3982483039912:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3982483039912:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3982483039912:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3982483039912:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 5305216677544:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5305216677544:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5305216677544:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5305216677544:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 1404085380776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1404085380776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1404085380776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1404085380776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 11799634114216:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 13583660320424:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 13583660320424:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 13583660320424:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13583660320424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 4680875464360:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4680875464360:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4680875464360:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4680875464360:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 12238915057320:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 12238915057320:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 12238915057320:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12238915057320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 4034621134504:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 14178672260776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14178672260776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14178672260776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14178672260776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 3437275199144:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3437275199144:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3437275199144:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3437275199144:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 16631277901480:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16631277901480:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16631277901480:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16631277901480:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 3709473654440:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 17153716745896:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 17153716745896:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 17153716745896:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 17153716745896:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 12392573703848:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 15613949920936:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 13096123897512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 13096123897512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 13096123897512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 13096123897512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 6020698154664:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 6020698154664:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 6020698154664:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 6020698154664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 1553086052008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 1553086052008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1553086052008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1553086052008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 1459906049704:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 13199751427752:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 7254050051752:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 0 7254050051752:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7254050051752:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7254050051752:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 10624690656936:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 10624690656936:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 10624690656936:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 10624690656936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 5138896488104:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 8775378458280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 12910397302440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 13019832350376:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 52491396776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 8936921425576:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 12423832917672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9876555572904:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 16162494846632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 899930158760:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 10779010193064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 10783904409256:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 15386055349928:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15386055349928:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15386055349928:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15386055349928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 6911034746536:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 14333124556456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14333124556456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14333124556456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14333124556456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 12796555732648:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: 12796555732648:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: SSL_read 0 12796555732648:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 12796555732648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 14543712896680:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 14543712896680:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 14543712896680:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 14543712896680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 1809215563432:error:1404C41B:SSL routines:ST_OK:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:167:SSL alert number 51 client: SSL_read -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 8232689108648:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 8232689108648:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: client: SSL_read 0 8232689108648:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 8232689108648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 1265069885096:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: client: SSL_read 01265069885096:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 1265069885096:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 1265069885096:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:921: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 2479692076712:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 2479692076712:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 2479692076712:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 2479692076712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 7690733258408:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7690733258408:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7690733258408:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7690733258408:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 7802054936232:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 7802054936232:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 7802054936232:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 7802054936232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 6508023727784:error:1403F3F2:SSL routines:ACCEPT_SR_FINISHED:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 16921604089512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 16921604089512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 16921604089512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 16921604089512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 3935737292456:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3935737292456:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3935737292456:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3935737292456:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 15128083031720:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 15128083031720:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 15128083031720:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 15128083031720:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 9537114384040:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 4301896054440:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 4301896054440:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 4301896054440:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 4301896054440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 3386816833192:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 3386816833192:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 3386816833192:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 3386816833192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 5762023564968:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:134: 5762023564968:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:646: 5762023564968:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/asn1_item.c:455: 5762023564968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:609: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 14493583021736:error:140393F2:SSL routines:ACCEPT_SR_CERT_VRFY:sslv3 alert unexpected message:/usr/src/lib/libssl/tls13_lib.c:192: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: client: SSL_accept -1SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: server: SSL_read 0SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: client: SSL_read 000000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: client: SSL_read 0 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: client: SSL_read 000000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: client: SSL_read 0 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: client: SSL_read 0 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: client: SSL_read 0 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: SSL_read 0 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: client: SSL_read 0 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-noca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-noca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 00:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: client: SSL_read 0 SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: server: SSL_read 0SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 00:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 00:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-ca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 client: SSL_read 0 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: client: SSL_read 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out` 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 client: SSL_read 00:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out` 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 SSL_accept -1 client: SSL_read 0 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-ca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -100000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-nocert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-ca-cert-certverify.out success ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-verify.out success ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1563:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3699: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A0000C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3726: server: SSL_accept -1 00000000:error:0A00045C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:909:SSL alert number 116 client: SSL_read 0 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-nocert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1563:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out` 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A000418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:909:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 0 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 client: SSL_read 000000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 00:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3713: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 client: SSL_read 0 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3739: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl32-fakeca-cert-noverify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:587: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1921: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl11-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1563:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/server >server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl32 ../openssl32/client >client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out` 00000000:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:79: 00000000:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:746: 00000000:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:801: 00000000:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:crypto/asn1/a_verify.c:218: 00000000:error:0A000086:SSL routines:tls_post_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:2092: client: SSL_connect -1 00000000:error:0A00041B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:909:SSL alert number 51 server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out server-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out client-cert-client-openssl32-fakeca-cert-verify-server-openssl32-fakeca-cert-certverify.out:verify: fail ==== run-bob ==== Bob, be happy! Tests finished. SKIP lib/libssl/interop Test skipped itself