Bug#552920: gnutls26: FTBFS: tests failed

Lucas Nussbaum lucas at lucas-nussbaum.net
Wed Oct 28 10:51:25 UTC 2009


Source: gnutls26
Version: 2.8.4-1
Severity: serious
User: debian-qa at lists.debian.org
Usertags: qa-ftbfs-20091028 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part:
> make[4]: Entering directory `/build/user-gnutls26_2.8.4-1-amd64-OcFEaI/gnutls26-2.8.4/tests'
> GnuTLS header version 2.8.4.
> GnuTLS library version 2.8.4.
> gnutls_check_version OK
> pk_list[0] = 1 = RSA = 1
> pk_list[1] = 2 = DSA = 2
> gnutls_pk_list ok
> sign_list[0] = 1 = RSA-SHA = 1
> sign_list[1] = 6 = RSA-SHA256 = 6
> sign_list[2] = 7 = RSA-SHA384 = 7
> sign_list[3] = 8 = RSA-SHA512 = 8
> sign_list[4] = 5 = RSA-RMD160 = 5
> sign_list[5] = 2 = DSA-SHA = 2
> sign_list[6] = 3 = RSA-MD5 = 3
> sign_list[7] = 4 = RSA-MD2 = 4
> gnutls_sign_list ok
> Self test `./simple' finished with 0 errors
> PASS: simple
> _gnutls_hmac_fast(MD5) OK
> _gnutls_hmac_fast(SHA1) OK
> _gnutls_pkcs5_pbkdf2_sha1() OK
> Self test `./gc' finished with 0 errors
> PASS: gc
> Reading PKCS#12 blob from `./pkcs12-decode/client.p12' using password `foobar'.
> Read file OK
> Reading PKCS#12 blob from `./pkcs12-decode/pkcs12_2certs.p12' using password `'.
> Read file OK
> Self test `./set_pkcs12_cred' finished with 0 errors
> PASS: set_pkcs12_cred
> done
> Self test `./certder' finished with 0 errors
> |<9>| MPI: length: 64
> 	rand:376668f92ae7c30659d29f6715d167fccb55d03b6265d586d927a2bf3ef28d063c09d94b0415d60e871c1c623f2360cf13cd1f8155a7c93ddaa6d83b64da2b49
> PASS: certder
> mpi ops ok
> Self test `./mpi' finished with 0 errors
> PASS: mpi
> PASS: certificate_set_x509_crl
> Issuer:
> dn[0][0] OID=2.5.4.10
> 	DATA=Root CA
> dn[1][0] OID=2.5.4.11
> 	DATA=http://www.cacert.org
> dn[2][0] OID=2.5.4.3
> 	DATA=CA Cert Signing Authority
> dn[3][0] OID=1.2.840.113549.1.9.1
> 	DATA=support at cacert.org
> Subject:
> dn[0][0] OID=2.5.4.3
> 	DATA=CAcert WoT User
> dn[1][0] OID=1.2.840.113549.1.9.1
> 	DATA=simon at josefsson.org
> done
> Self test `./dn' finished with 0 errors
> PASS: dn
> import ok
> Self test `./parse_ca' finished with 0 errors
> PASS: parse_ca
> success: cert init
> success: imported PEM cert
> success: got subject DN.
> success: exported subject DN.
> success: init DN.
> success: re-import subject DN.
> success: exported subject DN.
> success: export/import/export match.
> Self test `./moredn' finished with 0 errors
> PASS: moredn
> rng registered ok
> Self test `./crypto_rng' finished with 0 errors
> PASS: crypto_rng
> loop invoking client:
> client_push len 69 has 0
> 	;; 16 03 02 00 40 01 00 00  3c 03 02 4a e7 8a c8 31  
> 	;; a4 27 2b b4 1c 28 37 e3  b3 28 05 36 49 4f fe d4  
> 	;; 63 ea 63 d5 c7 7c 07 90  b1 a1 c0 00 00 0c 00 34  
> 	;; 00 46 00 3a 00 89 00 1b  00 18 01 00 00 07 00 09  
> 	;; 00 03 02 00 01 
> client_pull len 5 has 0
> client -28: Resource temporarily unavailable, try again.
> loop invoking server:
> server_pull len 5 has 69
> server_pull len 64 has 64
> server_push len 79 has 0
> 	;; 16 03 02 00 4a 02 00 00  46 03 02 4a e7 8a c8 f9  
> 	;; c0 3a 46 5d b1 9a 3e fd  40 4a 18 8a 72 83 66 ad  
> 	;; 34 95 72 bf 29 43 e8 6a  cf af 0e 20 a3 d3 9f 23  
> 	;; fd 8f 2c de 54 f7 00 eb  5a 5e e8 20 ce c8 ed f4  
> 	;; d5 43 53 9b a7 9b 9d 1f  f0 78 d6 83 00 34 00 
> server_push len 272 has 79
> 	;; 16 03 02 01 0b 0c 00 01  07 00 80 b6 4c 70 da 39  
> 	;; 6c 54 2b 2b 7c ba b1 ac  df 88 ac 5f f7 5b cb d5  
> 	;; 16 f0 f3 61 b2 e6 c6 2d  86 42 ff 6c fc f4 06 58  
> 	;; fd 5d f6 2d b6 3f 60 e9  ad f7 09 92 75 ad ec a8  
> 	;; 42 23 54 9a 62 c7 8e 40  82 08 01 83 fb f0 27 f2  
> 	;; 22 91 92 71 6f ef 4b c9  21 af 0d 2b 95 08 b2 78  
> 	;; 2b d0 80 5d ce 19 e1 8e  13 2c 1c c3 ea 10 4f 84  
> 	;; a6 14 e0 fb 1f 4b 26 25  ed 82 37 28 d8 a5 ec 41  
> 	;; 5d 0f c0 d2 66 d3 17 d4  0a 9b 57 00 01 05 00 80  
> 	;; 57 f1 20 c2 2c 16 ff 8e  65 93 16 88 94 85 ae 66  
> 	;; 89 15 04 14 c3 ca 11 d1  9d 27 42 09 9b a3 aa ce  
> 	;; 81 58 23 fb ca 0a 83 f1  e9 81 2c af cc d3 e0 b5  
> 	;; 41 06 12 59 91 77 e9 6a  ab 6d 2d 7c 45 ac f0 be  
> 	;; a4 f6 c6 53 d0 5a 9d 7f  45 de 41 e2 6b e7 20 d0  
> 	;; e2 46 27 2a 85 49 16 1d  c1 d5 4d b2 fb e6 11 1d  
> 	;; ef a7 5e d2 00 c3 c0 39  73 e9 bd aa 10 f1 69 eb  
> 	;; 29 a1 97 16 f7 3e bc c2  6d 05 c5 86 5a 35 f7 11  
> server_push len 9 has 351
> 	;; 16 03 02 00 04 0e 00 00  00 
> server_pull len 5 has 0
> server -28: Resource temporarily unavailable, try again.
> loop invoking client:
> client_pull len 5 has 360
> client_pull len 74 has 355
> client_pull len 5 has 281
> client_pull len 267 has 276
> client_pull len 5 has 9
> client_pull len 4 has 4
> client_push len 139 has 0
> 	;; 16 03 02 00 86 10 00 00  82 00 80 67 8b e5 9d 89  
> 	;; 0b 8c 5e 0f ce d3 bb 4c  a5 b2 ef 7d 8d 36 98 e4  
> 	;; c0 ef 85 b8 cb 6b 76 dc  be 03 f1 45 41 54 0e 29  
> 	;; 1b da 8c bd e4 5f a5 6e  b1 bf 3f 65 28 18 7c 58  
> 	;; c2 ef ae bb e6 ec ff 14  79 fa 06 3a be b0 a2 fb  
> 	;; b1 b5 ed d1 f2 e3 96 ec  cd bc b1 b9 7f 74 ee 17  
> 	;; 8c c7 ce a8 8c 61 f4 ce  bd 8b 0c cf 06 a6 dd 7e  
> 	;; 1a 73 f7 18 60 c7 6a 05  91 e0 8e 2d 00 1c 8d 61  
> 	;; 55 e6 81 fb c5 49 8c 83  4b 4b ce 
> client_push len 6 has 139
> 	;; 14 03 02 00 01 01 
> client_push len 69 has 145
> 	;; 16 03 02 00 40 55 fe 97  8f fc 5a 71 47 41 5d 75  
> 	;; 40 25 70 d4 94 67 fa 74  fb 28 53 e6 a1 89 9c d3  
> 	;; 62 ea 66 0e ce 27 c5 33  e9 10 0e 4d 07 2c 0d fa  
> 	;; 65 ec 46 93 24 16 fa d2  eb 7a 2c 78 be 37 b0 ca  
> 	;; 24 8a 74 ea c9 
> client_pull len 5 has 0
> client -28: Resource temporarily unavailable, try again.
> loop invoking server:
> server_pull len 5 has 214
> server_pull len 134 has 209
> server_pull len 5 has 75
> server_pull len 1 has 70
> server_pull len 5 has 69
> server_pull len 64 has 64
> server_push len 6 has 0
> 	;; 14 03 02 00 01 01 
> server_push len 261 has 6
> 	;; 16 03 02 01 00 e1 47 6c  c9 43 d7 7b ba 20 a0 92  
> 	;; 0d 06 15 94 81 7b ff 3e  90 c0 96 cf 96 33 80 94  
> 	;; 7d 70 88 59 4e 21 00 e1  be af 89 96 b2 c8 91 e1  
> 	;; 2c 7d 58 9b eb 3a d1 42  2d ce 37 18 f7 06 e1 e0  
> 	;; 44 c1 15 de 2b 6c f2 ec  61 ce 5f 3f 01 be 82 cb  
> 	;; 34 9d 59 cb 22 70 13 73  64 31 6f 60 9e 72 68 af  
> 	;; 7c 70 3f ef ad 12 b2 b3  59 72 83 66 1e e0 4c 66  
> 	;; 55 4d 7b 87 ee 16 e6 1a  64 3e d2 9b cc 74 92 4d  
> 	;; b8 37 9c 30 39 22 24 8f  ec fa a6 e3 9b 42 72 dd  
> 	;; 10 01 a7 e1 76 7e 6e f3  b6 73 33 e4 bb 85 74 79  
> 	;; b7 fd c2 77 7a d1 af 4d  cc a6 84 48 07 61 94 d6  
> 	;; e7 0e df 32 65 6d 01 d3  e9 8a d3 2b 43 0c c0 73  
> 	;; 10 4b 91 ff 15 88 42 96  e2 43 69 e3 2c cb 8d 16  
> 	;; 5a 12 9c 44 f5 16 68 a1  0b c6 38 89 b4 d2 1d 43  
> 	;; 8f ed 5d 96 d2 a2 53 47  7d 80 83 66 6e 28 b0 84  
> 	;; 83 d3 db 27 a0 95 a4 8c  12 4c 44 ca 55 d3 4a f9  
> 	;; 56 53 35 f6 b3 
> server 0: Success.
> loop invoking client:
> client_pull len 5 has 267
> client_pull len 1 has 262
> client_pull len 5 has 261
> client_pull len 256 has 256
> client 0: Success.
> Handshake established
> client_push len 69 has 0
> 	;; 17 03 02 00 40 15 da 89  6b 9c 8b 26 37 e0 b9 0f  
> 	;; 12 a6 81 0e fb b2 50 4f  79 e0 f8 26 e3 17 00 ae  
> 	;; f6 ee 1b b0 ba e4 7f 5b  b3 4a 45 d4 c6 85 5d 95  
> 	;; 05 c6 11 7a 63 19 d2 e5  d2 78 bf 95 7e ef fc 56  
> 	;; bf f5 35 f3 6f 
> client: sent 9
> server_pull len 5 has 69
> server_pull len 64 has 64
> server: received 9: Hello TLS
> server_push len 181 has 0
> 	;; 17 03 02 00 b0 8c e8 d1  09 a0 b8 be 7a 6d b7 91  
> 	;; 54 f2 c4 54 6f fb de 5e  95 12 d9 d7 4a 4b c1 12  
> 	;; 42 0e 6e ac 8f b5 1a 6b  ed d6 37 f0 88 f4 bc 9f  
> 	;; c0 31 17 3c 12 c9 b1 49  4d 6a e8 7f 98 56 48 b3  
> 	;; 43 0e b2 a5 9e 29 b0 0d  ae c7 61 87 7a f6 ea 8a  
> 	;; 03 ac ac 68 25 64 1a 58  1f 59 42 ab 5c 08 17 cf  
> 	;; a4 a2 32 a8 3b 64 f6 f7  9e 8b 36 13 7f d2 6e be  
> 	;; 96 04 9c 9d a5 13 e4 b0  e0 ca 7a 89 37 c6 9c 9d  
> 	;; 42 96 23 2e f1 c8 a7 86  cb 11 cb 9c d9 18 e9 fb  
> 	;; 12 50 a1 42 ff f7 e1 bc  8b 4c 9d 9b a1 90 17 1b  
> 	;; 00 d9 ab bd 79 29 0e a4  1a 16 ff 3e 7c e0 79 84  
> 	;; fc 0d 1d 6c 86 
> server: sent 9
> client_pull len 5 has 181
> client_pull len 176 has 176
> client: received 9: Hello TLS
> client_push len 261 has 0
> 	;; 15 03 02 01 00 c4 e0 95  45 32 60 cc 41 c3 07 fe  
> 	;; 3a 77 fa c1 7f ed fc b5  67 b8 78 3d 16 0c 92 a6  
> 	;; a0 ab 5b 8c ea b9 d2 d2  99 13 c9 4e f8 c2 ab 42  
> 	;; bb cf 4b c1 1f 0a 2e 93  ba fa cc 5d de 52 dc 7e  
> 	;; d7 04 59 24 b9 1b cc c7  d0 f9 f0 3d 07 c5 d6 0d  
> 	;; a3 d5 5f b4 d4 c4 2d a6  a2 8d 5c 6a e9 58 ea 84  
> 	;; ff 8e d5 33 c3 f8 83 b1  f1 68 4f aa c8 68 9d d6  
> 	;; 4b 9e cf 4e fc a4 62 10  12 ac 3c 3e 6e b1 3a 61  
> 	;; 2b ff 33 46 68 3e c3 a8  c4 ca 8e 63 49 23 16 fe  
> 	;; 28 5d 92 d4 34 13 05 c7  95 92 3a 42 4b 22 cb 22  
> 	;; a3 e1 dc d0 44 9b 20 d2  17 d4 4f fd c4 12 42 0a  
> 	;; db cd 5c 5b 77 cc 9b 14  de bc 98 03 a1 88 6c f5  
> 	;; 92 97 8b e7 3b 3d d9 20  9e 3d a3 c3 33 f5 ec e5  
> 	;; bc ca 94 3b c1 b5 16 76  65 f7 25 fd 7b 80 0a 57  
> 	;; 1d 0c 43 4f cc e0 d4 e7  c2 7b 07 73 4d 38 bf dc  
> 	;; 81 e7 14 bb 74 fe c1 fd  9f f8 4c 78 cc 08 f4 42  
> 	;; 50 25 9d 5f b5 
> client_pull len 5 has 0
> server_push len 69 has 0
> 	;; 15 03 02 00 40 03 d6 e6  5e d6 4c 27 96 26 91 08  
> 	;; 0e 4d 27 c4 f8 48 8c dc  8d b1 be e6 0e 32 35 13  
> 	;; f6 37 20 08 12 0e 9f a5  6a 49 e8 be 81 c1 1e ea  
> 	;; 6e 7d b5 3f 93 49 cc 5a  ae b4 d7 eb 3e d1 1b 93  
> 	;; 6a d2 04 6d 0f 
> server_pull len 5 has 261
> server_pull len 256 has 256
> Self test `./mini' finished with 0 errors
> PASS: mini
> loop invoking client:
> client_push len 69 has 0
> 	;; 16 03 02 00 40 01 00 00  3c 03 02 4a e7 8a c8 82  
> 	;; ba 21 a8 4b 50 72 98 a1  d9 de ed e0 0f ba 38 d6  
> 	;; 67 8e d1 0b 5d e4 ca 9c  24 8c f2 00 00 0c 00 34  
> 	;; 00 46 00 3a 00 89 00 1b  00 18 01 00 00 07 00 09  
> 	;; 00 03 02 00 01 
> client_pull len 5 has 0
> client -28: Resource temporarily unavailable, try again.
> loop invoking server:
> server_pull len 5 has 69
> server_pull len 64 has 64
> server_push len 79 has 0
> 	;; 16 03 02 00 4a 02 00 00  46 03 02 4a e7 8a c8 49  
> 	;; ff b8 07 2d e5 75 6e a6  b5 06 9f 64 9f 38 cd 75  
> 	;; 69 d7 70 f1 80 af 27 57  ca 32 ca 20 9a 9a ac 4f  
> 	;; ae 7d ac c7 98 bc f2 08  66 38 89 71 a1 d1 21 cd  
> 	;; 28 85 56 f0 7b 55 8a 83  12 02 32 e2 00 34 00 
> server_push len 272 has 79
> 	;; 16 03 02 01 0b 0c 00 01  07 00 80 b6 4c 70 da 39  
> 	;; 6c 54 2b 2b 7c ba b1 ac  df 88 ac 5f f7 5b cb d5  
> 	;; 16 f0 f3 61 b2 e6 c6 2d  86 42 ff 6c fc f4 06 58  
> 	;; fd 5d f6 2d b6 3f 60 e9  ad f7 09 92 75 ad ec a8  
> 	;; 42 23 54 9a 62 c7 8e 40  82 08 01 83 fb f0 27 f2  
> 	;; 22 91 92 71 6f ef 4b c9  21 af 0d 2b 95 08 b2 78  
> 	;; 2b d0 80 5d ce 19 e1 8e  13 2c 1c c3 ea 10 4f 84  
> 	;; a6 14 e0 fb 1f 4b 26 25  ed 82 37 28 d8 a5 ec 41  
> 	;; 5d 0f c0 d2 66 d3 17 d4  0a 9b 57 00 01 05 00 80  
> 	;; 63 a5 a4 4b 6f 8b 44 06  19 f2 50 1e 21 c0 65 2b  
> 	;; f2 8d ab a1 53 b1 00 e5  85 62 78 74 54 3d dc 77  
> 	;; 4e 56 b3 40 0e cb 84 de  56 56 43 45 4e 47 50 46  
> 	;; bd ed 37 ed 79 5b 68 fc  52 b5 da b7 8e 52 93 3c  
> 	;; d2 9e 65 8c 17 ec ff 83  65 72 42 b9 05 7f 3d ea  
> 	;; ea f3 1e a0 80 ba 7d 69  a8 ef f4 55 cd 5d e0 c9  
> 	;; ed 11 9a 3b e0 75 89 68  0d a3 5e d2 1c 50 12 0e  
> 	;; a3 11 06 3a 89 0b 94 db  b7 66 86 fb b6 a2 cf e2  
> server_push len 9 has 351
> 	;; 16 03 02 00 04 0e 00 00  00 
> server_pull len 5 has 0
> server -28: Resource temporarily unavailable, try again.
> loop invoking client:
> client_pull len 5 has 360
> client_pull len 74 has 355
> client_pull len 5 has 281
> client_pull len 267 has 276
> client_pull len 5 has 9
> client_pull len 4 has 4
> client_push len 139 has 0
> 	;; 16 03 02 00 86 10 00 00  82 00 80 57 90 7b 03 79  
> 	;; 5d aa 1d 44 27 f4 86 20  1e c8 a5 bf fd 9a 7e 21  
> 	;; df 72 f2 5a 93 d7 87 8a  a5 c0 5c 5d 16 b0 fd 70  
> 	;; 1c 4c a2 2a 51 6b 5c ea  ab 55 ac ea 3f 48 56 a8  
> 	;; 8f a4 6b 0e 49 5e 5c 16  fa f5 91 20 40 15 6e d5  
> 	;; c8 df fc 3f 5e 16 51 4e  38 94 83 f8 50 ad 7c fd  
> 	;; d3 13 81 06 5c 8f 80 81  35 76 11 a7 49 53 46 19  
> 	;; 44 a8 15 dc d9 80 41 76  16 05 2c 67 09 58 72 dd  
> 	;; 7d 4d 7e df cc 55 32 f9  2e 8a 42 
> client_push len 6 has 139
> 	;; 14 03 02 00 01 01 
> client finished (length 12)
> 	;; 04 24 b7 52 d5 4c f1 34  2d e7 c7 26 
> client_push len 181 has 145
> 	;; 16 03 02 00 b0 d1 2c 7d  ed e4 5a 19 98 cc 58 b9  
> 	;; b2 3d 66 f5 a2 d0 e6 d0  b9 21 3f f4 47 b4 36 47  
> 	;; c5 9e 5a 55 1a 59 88 eb  68 cb a7 46 1a 9f d2 37  
> 	;; 33 83 f2 a2 d5 69 be 56  12 9b 73 56 3a c5 5b c4  
> 	;; fb df c4 91 ca 3f 4b a0  82 d2 b5 fd ce 77 fa 7e  
> 	;; 34 c1 de bc 95 74 c6 1d  65 b4 9b 25 94 b3 ac 43  
> 	;; 66 ca 2b cc aa 97 19 e1  40 76 84 77 19 27 ef d2  
> 	;; d4 27 8a 5d 2e 52 67 e0  22 25 ac db 4a d3 91 8d  
> 	;; 86 a3 f2 dc 40 03 29 f7  de 62 1c 64 25 62 82 94  
> 	;; 22 2d 4f 10 5a 00 3c c1  d5 a1 f8 df a1 d8 79 97  
> 	;; 19 ad df 5d 2e 3d 4f 67  b5 5a 01 4c 5c f8 85 19  
> 	;; 93 21 b4 e0 cd 
> client_pull len 5 has 0
> client -28: Resource temporarily unavailable, try again.
> loop invoking server:
> server_pull len 5 has 326
> server_pull len 134 has 321
> server_pull len 5 has 187
> server_pull len 1 has 182
> server_pull len 5 has 181
> server_pull len 176 has 176
> server_push len 6 has 0
> 	;; 14 03 02 00 01 01 
> server finished (length 12)
> 	;; 65 40 00 24 02 0c a8 13  1c 3b f1 3f 
> server_push len 85 has 6
> 	;; 16 03 02 00 50 52 22 09  bc 02 bb 1a 05 1d 28 b1  
> 	;; 85 4b 6a 08 c5 ea 07 ef  1b f2 e5 ef 1a bf 35 dc  
> 	;; e9 28 3b 60 f1 38 87 f6  2d 64 28 a0 51 8c cc 2e  
> 	;; 87 e8 56 6b 00 0a 52 bb  04 28 77 7d f9 d9 19 8f  
> 	;; ab 29 45 70 fa a2 ae a3  61 e8 1a b3 f3 0b 9a 04  
> 	;; 99 f1 94 16 b0 
> server 0: Success.
> loop invoking client:
> client_pull len 5 has 91
> client_pull len 1 has 86
> client_pull len 5 has 85
> client_pull len 80 has 80
> client 0: Success.
> Handshake established
> client_push len 245 has 0
> 	;; 17 03 02 00 f0 b8 d8 04  0b ce ea c1 e3 e2 ca c5  
> 	;; 23 51 1f c4 af 0b 77 a3  1b d1 3b be 05 12 5a b9  
> 	;; 24 77 41 43 fb 6a 70 d7  7c f5 e7 43 81 69 fa d4  
> 	;; 61 57 b2 54 7e c9 9d a9  d5 2a f1 22 67 c0 42 bc  
> 	;; c1 7b c5 9b 5a ae af 87  b2 f1 22 1e 2b 40 a8 09  
> 	;; af 30 2a 4f 9e f7 5b 72  12 7a 74 5d c6 67 a1 66  
> 	;; cd 58 ff 19 14 e4 a9 22  cf 6d 09 6a 99 d9 f3 95  
> 	;; 14 ee 9c 1d dd ba b6 5d  5f bb 0f 94 9a e4 1d 57  
> 	;; f4 94 5d e8 2a 0f 1f 0c  49 8c fd 0a 48 f7 76 78  
> 	;; 63 4b 9c 22 0d 72 5c 7a  d8 9e 6b 13 71 cd 3a 5e  
> 	;; 05 29 02 21 03 34 e0 bc  60 bd 6a 49 0a 46 62 f5  
> 	;; fb 46 72 8e 54 cd be 80  f9 af fe ba fb 0c 8f 6e  
> 	;; 3a e6 72 af fa aa ad bf  af 0c 72 00 18 aa be e6  
> 	;; f7 c0 37 35 44 7f d8 d4  7e c7 cd 46 bf 40 13 54  
> 	;; f3 41 0c 3b f1 e0 91 6f  48 59 b3 18 4c 04 0c 89  
> 	;; 5e 29 57 9a 47 
> client: sent 9
> server_pull len 5 has 245
> server_pull len 240 has 240
> server: received 9: Hello TLS
> server_push len 213 has 0
> 	;; 17 03 02 00 d0 c5 86 ea  fe 2c 40 7a e5 15 8d 92  
> 	;; 9c af ed 11 45 93 86 f0  c3 ce 1b b5 44 d3 f6 da  
> 	;; a6 93 a2 43 e6 8b 8e c1  9e 5f c8 a9 3d 00 93 ac  
> 	;; b8 11 b8 8d 60 8b 1e b7  72 4b b9 05 dc be 05 4d  
> 	;; fd 73 73 84 95 6d d7 e5  2b a6 2d ee ab b0 d8 fb  
> 	;; 5b 1c 62 42 fe e1 5b 24  f8 08 4b 54 9a 8d b8 9e  
> 	;; 28 3b 76 c5 bc a1 ed 28  83 dc 8a 3a 89 3b c5 03  
> 	;; 92 da 59 f9 e7 31 2b 7c  2e f4 db 2e 4a 4c b8 04  
> 	;; 8d 26 28 e9 f9 ac fc c2  23 02 8c 89 95 e4 ce cf  
> 	;; 83 7e 76 c4 12 74 87 f1  0b b8 1d e7 0b 0d 98 41  
> 	;; 7b 97 ac 57 9e de 36 ad  a7 1b d8 2a 07 82 c6 08  
> 	;; a8 b7 31 7d fc 13 76 d9  db 66 c2 55 53 d4 12 0f  
> 	;; d0 fe ae 5a 9c 60 e6 cd  c1 44 76 0d 39 86 1e 0c  
> 	;; 54 58 0a 5e cb 
> server: sent 9
> client_pull len 5 has 213
> client_pull len 208 has 208
> client: received 9: Hello TLS
> client_push len 261 has 0
> 	;; 15 03 02 01 00 75 88 30  f0 0f 3e 70 f8 f6 20 c0  
> 	;; 64 bf 9b e9 38 ea 16 2b  8f 1d 46 79 a3 f6 31 30  
> 	;; 60 87 3f 4e f8 a1 4b 66  51 fb 73 92 09 07 24 2b  
> 	;; 52 90 48 d7 4c 03 e4 9f  5b 5e ab 9b 5a cb 8f 3e  
> 	;; 0c f9 eb 5f c2 48 c1 5d  a1 a7 91 76 e2 86 46 ac  
> 	;; a4 f5 af 8f fe 40 fc 9a  c9 69 ce 3b 24 67 f3 8d  
> 	;; 73 28 01 cf 15 e3 04 b5  4e fe ce 66 11 fa ca 70  
> 	;; 3c 6c 3f 24 3c 4a 09 96  f6 48 fa 9e b1 97 d3 fe  
> 	;; 4c 6d a6 71 2d 15 26 04  32 a1 73 2b df aa 7e 9f  
> 	;; 4a 83 dc 75 a6 ab 8d df  a7 20 88 cd 60 72 d3 80  
> 	;; 18 3c ba 06 d3 a1 49 e0  b8 43 12 e6 6a f6 24 16  
> 	;; d7 a2 a1 17 c2 d4 3d 00  4e 8c 91 d9 fd 9d 31 0a  
> 	;; fa 00 0b e3 36 7a 09 3b  86 3c 02 81 c8 a5 92 87  
> 	;; b1 87 bc 86 5c ae 86 a9  6f fe 24 9e 67 88 97 3a  
> 	;; 57 f7 bc 74 76 3e a2 f0  0c 98 d7 9d 9c 75 ef bd  
> 	;; 17 85 91 ed df c1 2e 96  c3 a2 1e ac 0a 0c e5 f3  
> 	;; 8e f4 c5 03 ea 
> client_pull len 5 has 0
> server_push len 261 has 0
> 	;; 15 03 02 01 00 13 18 e1  b5 00 2c 6f f9 83 21 95  
> 	;; b9 5c 29 54 7c 8f 0c e9  c1 58 5b bc 2f e0 3d 98  
> 	;; c3 4e 2d 97 c6 fe 3c 7f  c5 73 51 e1 55 d1 d4 d4  
> 	;; a7 d8 ae 77 cf 90 2f ea  b6 71 10 39 54 48 d1 b2  
> 	;; 80 8b d1 d3 ac b3 ef c6  1c bf 8d 96 e8 c2 47 ad  
> 	;; bd a8 cc f5 72 09 c4 74  eb fe 26 17 57 11 20 cf  
> 	;; 34 ff 14 6a f5 88 7d 10  2a 9d c3 4f 01 71 2d 34  
> 	;; ea 9f 18 93 3d f8 a2 76  53 60 65 71 03 35 5c 3b  
> 	;; 35 0b 57 cd cb 83 e4 5e  83 4e 38 66 42 84 dc 8b  
> 	;; 84 64 d5 2e e7 11 a3 4b  c2 71 41 2c c7 55 49 9f  
> 	;; c3 da ed 5d 6d 33 9d 86  da aa f0 ba f9 c5 5a d1  
> 	;; 67 2f d3 22 09 b9 8d 36  21 cd 13 50 23 a2 94 b2  
> 	;; 9e 04 23 f4 62 a0 fb 8b  83 1f c3 dc fa 0b 80 56  
> 	;; a8 54 b4 62 a9 00 2e 97  0a be 80 ff b2 b0 7f a5  
> 	;; a0 b6 fb da 80 43 25 24  97 0a 43 b5 c3 c0 22 ff  
> 	;; c7 aa c6 e7 be 42 f2 f7  39 21 f3 95 c2 aa 37 0b  
> 	;; 28 7d ea 4a 3c 
> server_pull len 5 has 261
> server_pull len 256 has 256
> Self test `./finished' finished with 0 errors
> PASS: finished
> Testing pem1...
> Hostname correctly does not match (0)
> Testing pem2...
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Hostname correctly does not match (0)
> Testing pem3...
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Hostname correctly does not match (0)
> Testing pem4...
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Hostname correctly matches (1)
> Hostname correctly does not match (0)
> Testing pem5...
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Hostname correctly does not match (0)
> Testing pem6...
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Testing pem7...
> Hostname correctly does not match (0)
> Hostname correctly does not match (0)
> Hostname correctly matches (1)
> Hostname correctly matches (1)
> Testing pem8...
> Hostname correctly matches (1)
> Hostname correctly matches (1)
> Hostname correctly matches (1)
> Hostname correctly does not match (0)
> Self test `./hostname-check' finished with 0 errors
> PASS: hostname-check
> PASS: cve-2008-4989
> ij: 1.0: 85a3c676a66f0960f4807144a28c8d61a0001b81846f301a1ac164289879972f
> ij: 1.1: e659da7d5989733a3d268e0bf7752c35c116e5c75919449a98f6812f82a15b16
> ij: 1.2: 878b8a88bf6166ce803b7498822205b1ac82870d3aec20807148779375a61f1e
> ij: 2.0: 1c845be764371d633c7fd1056967a9940385e110e85b58f826d39ae8561a0019
> ij: 2.1: de8dd3ffd59b65d3d5f59a1f71d7add582741f7752a786c045953e727e4465c0
> ij: 2.2: 9dd7f19e5e6aee5c5008b5deefd35889ab75193594ed49a605df4e93e7c2a155
> ij: 3.0: 1c165e5a291a1539f3dbcf82a3e6ed566eb9d50ad4b0b3b57b599b08f0531236
> ij: 3.1: 5c9abee3cde31656eedfc131b7c2f8061032a3c705961ee2306a826c8b4b1a76
> ij: 3.2: a9c94e0acdaeaea54d1b1b681c3b64916396a352dea7ffe635fb2c11d8502e98
> 
> _gnutls_pkcs12_string_to_key ok
> Self test `./pkcs12_s2k' finished with 0 errors
> PASS: pkcs12_s2k
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:245
> |<2>| ASSERT: verify.c:294
> |<2>| ASSERT: verify.c:474
> Chain 'CVE-2008-4989' (0)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,O=GNU TLS Attack,CN=server', issuer `C=DE,O=GNU TLS Attack,CN=intermediate', RSA key 1024 bits, signed using RSA-SHA, activated `2008-11-03 12:05:04 UTC', expires `2008-12-03 12:05:04 UTC', SHA-1 fingerprint `0cc65ee009e1345dbc0458545ffaaacbaf11c6ef'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=DE,O=GNU TLS Attack,CN=intermediate', issuer `C=DE,O=GNU TLS Attack,CN=root', RSA key 1024 bits, signed using RSA-SHA, activated `2008-11-03 12:04:45 UTC', expires `2008-12-03 12:04:45 UTC', SHA-1 fingerprint `6d20189cb569bd77b7775a41171781dfa49f6211'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=thawte\, Inc.,OU=Certification Services Division,OU=(c) 2006 thawte\, Inc. - For authorized use only,CN=thawte Primary Root CA', issuer `C=US,O=thawte\, Inc.,OU=Certification Services Division,OU=(c) 2006 thawte\, Inc. - For authorized use only,CN=thawte Primary Root CA', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-17 00:00:00 UTC', expires `2036-07-16 23:59:59 UTC', SHA-1 fingerprint `91c6d6ee3e8ac86384e548c299295c756c817b81'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=thawte\, Inc.,OU=Certification Services Division,OU=(c) 2006 thawte\, Inc. - For authorized use only,CN=thawte Primary Root CA', issuer `C=US,O=thawte\, Inc.,OU=Certification Services Division,OU=(c) 2006 thawte\, Inc. - For authorized use only,CN=thawte Primary Root CA', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-17 00:00:00 UTC', expires `2036-07-16 23:59:59 UTC', SHA-1 fingerprint `91c6d6ee3e8ac86384e548c299295c756c817b81'
> 	Verifying...done
> 	Cleanup...done
> Chain 'verisign.com v1 fail' (1)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `serialNumber=2497886,1.3.6.1.4.1.311.60.2.1.3=#13025553,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,C=US,2.5.4.17=#14053934303433,ST=California,L=Mountain View,STREET=487 East Middlefield Road,O=VeriSign\, Inc.,OU=Production Security Services,OU=Terms of use at www.verisign.com/rpa (c)06,CN=www.verisign.com', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', RSA key 1024 bits, signed using RSA-SHA, activated `2007-05-09 00:00:00 UTC', expires `2009-05-08 23:59:59 UTC', SHA-1 fingerprint `c6750e8da95f5a65bb046d6079d4fc87402e0381'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2016-11-07 23:59:59 UTC', SHA-1 fingerprint `4a8a2a0e276ff33b5dd88a362146010f2a8b6aee'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2021-11-07 23:59:59 UTC', SHA-1 fingerprint `7e7e026f71bfe7bbc7e7e5c591b1915cb6684e6c'
> 	Adding certificate 3...done
> 	Certificate 3: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: dn.c:1210
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'verisign.com v1 fail2' (2)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `serialNumber=2497886,1.3.6.1.4.1.311.60.2.1.3=#13025553,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,C=US,2.5.4.17=#14053934303433,ST=California,L=Mountain View,STREET=487 East Middlefield Road,O=VeriSign\, Inc.,OU=Production Security Services,OU=Terms of use at www.verisign.com/rpa (c)06,CN=www.verisign.com', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', RSA key 1024 bits, signed using RSA-SHA, activated `2007-05-09 00:00:00 UTC', expires `2009-05-08 23:59:59 UTC', SHA-1 fingerprint `c6750e8da95f5a65bb046d6079d4fc87402e0381'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2016-11-07 23:59:59 UTC', SHA-1 fingerprint `4a8a2a0e276ff33b5dd88a362146010f2a8b6aee'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2021-11-07 23:59:59 UTC', SHA-1 fingerprint `7e7e026f71bfe7bbc7e7e5c591b1915cb6684e6c'
> 	Adding certificate 3...done
> 	Certificate 3: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'verisign.com v1 ok' (3)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `serialNumber=2497886,1.3.6.1.4.1.311.60.2.1.3=#13025553,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,C=US,2.5.4.17=#14053934303433,ST=California,L=Mountain View,STREET=487 East Middlefield Road,O=VeriSign\, Inc.,OU=Production Security Services,OU=Terms of use at www.verisign.com/rpa (c)06,CN=www.verisign.com', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', RSA key 1024 bits, signed using RSA-SHA, activated `2007-05-09 00:00:00 UTC', expires `2009-05-08 23:59:59 UTC', SHA-1 fingerprint `c6750e8da95f5a65bb046d6079d4fc87402e0381'
> 	Adding certificate 1...done
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL SGC CA', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2016-11-07 23:59:59 UTC', SHA-1 fingerprint `4a8a2a0e276ff33b5dd88a362146010f2a8b6aee'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2006-11-08 00:00:00 UTC', expires `2021-11-07 23:59:59 UTC', SHA-1 fingerprint `7e7e026f71bfe7bbc7e7e5c591b1915cb6684e6c'
> 	Adding certificate 3...done
> 	Certificate 3: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'citibank.com v1 fail' (4)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=New Jersey,L=Weehawken,O=Citigroup,OU=whg-oak6,CN=www.citibank.com', issuer `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', RSA key 1024 bits, signed using RSA-SHA, activated `2008-08-29 00:00:00 UTC', expires `2010-08-29 23:59:59 UTC', SHA-1 fingerprint `8b410d9cf13f191596a65f1f77580ddfa37aba49'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-SHA, activated `1997-04-17 00:00:00 UTC', expires `2011-10-24 23:59:59 UTC', SHA-1 fingerprint `c2f0087d01e686053a4d633e7e70d4ef65c2cc4f'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'expired self signed' (5)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', issuer `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', RSA key 2048 bits, signed using RSA-SHA, activated `2008-05-30 19:53:43 UTC', expires `2008-11-26 19:53:43 UTC', SHA-1 fingerprint `87a0285ef6fa364664a50034a631c10a7279a77f'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', issuer `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', RSA key 2048 bits, signed using RSA-SHA, activated `2008-05-30 19:53:43 UTC', expires `2008-11-26 19:53:43 UTC', SHA-1 fingerprint `87a0285ef6fa364664a50034a631c10a7279a77f'
> 	Verifying...done
> 	Cleanup...done
> Chain 'self signed' (6)...
> 	Adding certificate 0...done
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> 	Certificate 0: subject `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', issuer `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', RSA key 2048 bits, signed using RSA-SHA, activated `2008-05-30 19:53:43 UTC', expires `2008-11-26 19:53:43 UTC', SHA-1 fingerprint `87a0285ef6fa364664a50034a631c10a7279a77f'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', issuer `C=BR,O=Minas Livre,CN=Thadeu Lima de Souza Cascardo', RSA key 2048 bits, signed using RSA-SHA, activated `2008-05-30 19:53:43 UTC', expires `2008-11-26 19:53:43 UTC', SHA-1 fingerprint `87a0285ef6fa364664a50034a631c10a7279a77f'
> 	Verifying...done
> 	Cleanup...done
> Chain 'ca=false' (7)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,ST=RLP,L=Kaiserslautern,O=Technische Universitaet,OU=Fachbereich Physik,CN=thea.physik.uni-kl.de', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:52:07 UTC', expires `2018-09-09 10:52:07 UTC', SHA-1 fingerprint `2fbe7e0f2266f7247b06cd41e63a3e1a104e4fd5'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:47:44 UTC', expires `2018-09-09 10:47:44 UTC', SHA-1 fingerprint `5c3a6e72781972580071abeefe730d1b85f6d167'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:47:44 UTC', expires `2018-09-09 10:47:44 UTC', SHA-1 fingerprint `5c3a6e72781972580071abeefe730d1b85f6d167'
> 	Verifying...done
> 	Cleanup...done
> Chain 'ca=false2' (8)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,ST=RLP,L=Kaiserslautern,O=Technische Universitaet,OU=Fachbereich Physik,CN=thea.physik.uni-kl.de', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:52:07 UTC', expires `2018-09-09 10:52:07 UTC', SHA-1 fingerprint `2fbe7e0f2266f7247b06cd41e63a3e1a104e4fd5'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:47:44 UTC', expires `2018-09-09 10:47:44 UTC', SHA-1 fingerprint `5c3a6e72781972580071abeefe730d1b85f6d167'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', issuer `C=DE,ST=RLP,O=Technische Universitaet,OU=Fachbereich Physik,CN=CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-09-11 10:47:44 UTC', expires `2018-09-09 10:47:44 UTC', SHA-1 fingerprint `5c3a6e72781972580071abeefe730d1b85f6d167'
> 	Verifying...done
> 	Cleanup...done
> Chain 'hbci v1 fail' (9)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,ST=Hessen,L=Frankfurt am Main,O=Sparkassen Informatik GmbH & Co. KG,OU=Terms of use at www.verisign.com,CN=hbci-pintan-rp.s-hbci.de', issuer `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', RSA key 1024 bits, signed using RSA-SHA, activated `2008-06-10 00:00:00 UTC', expires `2009-07-30 23:59:59 UTC', SHA-1 fingerprint `a648bde8c1d773504947bc581ac730ea0bdb4df6'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-SHA, activated `1997-04-17 00:00:00 UTC', expires `2011-10-24 23:59:59 UTC', SHA-1 fingerprint `c2f0087d01e686053a4d633e7e70d4ef65c2cc4f'
> 	Adding certificate 2...done
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: dn.c:1210
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'hbci v1 ok expired' (10)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,ST=Hessen,L=Frankfurt am Main,O=Sparkassen Informatik GmbH & Co. KG,OU=Terms of use at www.verisign.com,CN=hbci-pintan-rp.s-hbci.de', issuer `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', RSA key 1024 bits, signed using RSA-SHA, activated `2008-06-10 00:00:00 UTC', expires `2009-07-30 23:59:59 UTC', SHA-1 fingerprint `a648bde8c1d773504947bc581ac730ea0bdb4df6'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-SHA, activated `1997-04-17 00:00:00 UTC', expires `2011-10-24 23:59:59 UTC', SHA-1 fingerprint `c2f0087d01e686053a4d633e7e70d4ef65c2cc4f'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'hbci v1 ok' (11)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=DE,ST=Hessen,L=Frankfurt am Main,O=Sparkassen Informatik GmbH & Co. KG,OU=Terms of use at www.verisign.com,CN=hbci-pintan-rp.s-hbci.de', issuer `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', RSA key 1024 bits, signed using RSA-SHA, activated `2008-06-10 00:00:00 UTC', expires `2009-07-30 23:59:59 UTC', SHA-1 fingerprint `a648bde8c1d773504947bc581ac730ea0bdb4df6'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=VeriSign Trust Network,OU=VeriSign\, Inc.,OU=VeriSign International Server CA - Class 3,OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-SHA, activated `1997-04-17 00:00:00 UTC', expires `2011-10-24 23:59:59 UTC', SHA-1 fingerprint `c2f0087d01e686053a4d633e7e70d4ef65c2cc4f'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:474
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'rsa-md5 fail' (12)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,O=support.mayfirst.org,OU=GT69079880,OU=See www.rapidssl.com/resources/cps (c)07,OU=Domain Control Validated - RapidSSL(R),CN=support.mayfirst.org', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `2008-05-19 05:29:19 UTC', expires `2009-10-19 05:29:19 UTC', SHA-1 fingerprint `be7755879c78be4a19c16f789f752c4394a85395'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> 	Verifying...done
> 	Cleanup...done
> Chain 'rsa-md5 not ok' (13)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,O=support.mayfirst.org,OU=GT69079880,OU=See www.rapidssl.com/resources/cps (c)07,OU=Domain Control Validated - RapidSSL(R),CN=support.mayfirst.org', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `2008-05-19 05:29:19 UTC', expires `2009-10-19 05:29:19 UTC', SHA-1 fingerprint `be7755879c78be4a19c16f789f752c4394a85395'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> 	Verifying...done
> 	Cleanup...done
> Chain 'rsa-md5 ok' (14)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,O=support.mayfirst.org,OU=GT69079880,OU=See www.rapidssl.com/resources/cps (c)07,OU=Domain Control Validated - RapidSSL(R),CN=support.mayfirst.org', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `2008-05-19 05:29:19 UTC', expires `2009-10-19 05:29:19 UTC', SHA-1 fingerprint `be7755879c78be4a19c16f789f752c4394a85395'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> 	Adding CA certificate...done
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> ./chainverify: verify_status: 1026 expected: 0
> 	CA Certificate: subject `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', issuer `C=US,O=Equifax Secure Inc.,CN=Equifax Secure Global eBusiness CA-1', RSA key 1024 bits, signed using RSA-MD5 (broken!), activated `1999-06-21 04:00:00 UTC', expires `2020-06-21 04:00:00 UTC', SHA-1 fingerprint `7e784a101c8265cc2de1f16d47b440cad90a1945'
> |<2>| ASSERT: verify.c:178
> |<2>| ASSERT: verify.c:310
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: dn.c:1210
> 	Verifying...	Cleanup...done
> Chain 'v1ca fail' (15)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=Illinois,L=Du Page,O=Argonne National Laboratory,CN=auth2.it.anl.gov', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-05-05 00:00:00 UTC', expires `2009-05-22 23:59:59 UTC', SHA-1 fingerprint `687c93b7db0cc9b9d899aa2e9633e18db0ba7925'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2005-01-19 00:00:00 UTC', expires `2015-01-18 23:59:59 UTC', SHA-1 fingerprint `188590e94878478e33b6194e59fbbb28ff0888d5'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'v1ca expired' (16)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=Illinois,L=Du Page,O=Argonne National Laboratory,CN=auth2.it.anl.gov', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-05-05 00:00:00 UTC', expires `2009-05-22 23:59:59 UTC', SHA-1 fingerprint `687c93b7db0cc9b9d899aa2e9633e18db0ba7925'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2005-01-19 00:00:00 UTC', expires `2015-01-18 23:59:59 UTC', SHA-1 fingerprint `188590e94878478e33b6194e59fbbb28ff0888d5'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'v1ca ok' (17)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=Illinois,L=Du Page,O=Argonne National Laboratory,CN=auth2.it.anl.gov', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-05-05 00:00:00 UTC', expires `2009-05-22 23:59:59 UTC', SHA-1 fingerprint `687c93b7db0cc9b9d899aa2e9633e18db0ba7925'
> 	Adding certificate 1...done
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:173
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:173
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: dn.c:1210
> |<2>| ASSERT: verify.c:245
> |<2>| ASSERT: verify.c:294
> |<2>| ASSERT: verify.c:474
> |<2>| ASSERT: mpi.c:620
> |<2>| ASSERT: dn.c:1210
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2005-01-19 00:00:00 UTC', expires `2015-01-18 23:59:59 UTC', SHA-1 fingerprint `188590e94878478e33b6194e59fbbb28ff0888d5'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'v1ca2 expired' (18)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=Illinois,L=Du Page,O=Argonne National Laboratory,CN=auth2.it.anl.gov', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-05-05 00:00:00 UTC', expires `2009-05-22 23:59:59 UTC', SHA-1 fingerprint `687c93b7db0cc9b9d899aa2e9633e18db0ba7925'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2005-01-19 00:00:00 UTC', expires `2015-01-18 23:59:59 UTC', SHA-1 fingerprint `188590e94878478e33b6194e59fbbb28ff0888d5'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'v1ca2 ok' (19)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `C=US,ST=Illinois,L=Du Page,O=Argonne National Laboratory,CN=auth2.it.anl.gov', issuer `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', RSA key 1024 bits, signed using RSA-SHA, activated `2008-05-05 00:00:00 UTC', expires `2009-05-22 23:59:59 UTC', SHA-1 fingerprint `687c93b7db0cc9b9d899aa2e9633e18db0ba7925'
> 	Adding certificate 1...done
> 	Certificate 1: subject `C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)05,CN=VeriSign Class 3 Secure Server CA', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 2048 bits, signed using RSA-SHA, activated `2005-01-19 00:00:00 UTC', expires `2015-01-18 23:59:59 UTC', SHA-1 fingerprint `188590e94878478e33b6194e59fbbb28ff0888d5'
> 	Adding certificate 2...done
> 	Certificate 2: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Adding CA certificate...done
> 	CA Certificate: subject `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', issuer `C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority', RSA key 1024 bits, signed using RSA-MD2 (broken!), activated `1996-01-29 00:00:00 UTC', expires `2028-08-01 23:59:59 UTC', SHA-1 fingerprint `742c3192e607e424eb4549542be1bbc53e6174e2'
> 	Verifying...done
> 	Cleanup...done
> Chain 'cacertrsamd5 fail' (20)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `CN=fry.serverama.de', issuer `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', RSA key 1024 bits, signed using RSA-SHA, activated `2009-01-16 22:29:47 UTC', expires `2011-01-16 22:29:47 UTC', SHA-1 fingerprint `7d18c5e1f1fc350458b499ee5d95bbf41274597d'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Adding certificate 2...done
> 	Certificate 2: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Adding CA certificate...done
> 	CA Certificate: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Verifying...done
> 	Cleanup...done
> Chain 'cacertrsamd5 ok' (21)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `CN=fry.serverama.de', issuer `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', RSA key 1024 bits, signed using RSA-SHA, activated `2009-01-16 22:29:47 UTC', expires `2011-01-16 22:29:47 UTC', SHA-1 fingerprint `7d18c5e1f1fc350458b499ee5d95bbf41274597d'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Adding certificate 2...done
> 	Certificate 2: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Adding CA certificate...done
> 	CA Certificate: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Verifying...done
> 	Cleanup...done
> Chain 'cacertrsamd5 short-cut not ok' (22)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `CN=fry.serverama.de', issuer `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', RSA key 1024 bits, signed using RSA-SHA, activated `2009-01-16 22:29:47 UTC', expires `2011-01-16 22:29:47 UTC', SHA-1 fingerprint `7d18c5e1f1fc350458b499ee5d95bbf41274597d'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Adding certificate 2...done
> 	Certificate 2: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Adding CA certificate...done
> 	CA Certificate: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Verifying...done
> 	Cleanup...done
> Chain 'cacertrsamd5 short-cut ok' (23)...
> 	Adding certificate 0...done
> 	Certificate 0: subject `CN=fry.serverama.de', issuer `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', RSA key 1024 bits, signed using RSA-SHA, activated `2009-01-16 22:29:47 UTC', expires `2011-01-16 22:29:47 UTC', SHA-1 fingerprint `7d18c5e1f1fc350458b499ee5d95bbf41274597d'
> 	Adding certificate 1...done
> 	Certificate 1: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Adding certificate 2...done
> 	Certificate 2: subject `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2003-03-30 12:29:49 UTC', expires `2033-03-29 12:29:49 UTC', SHA-1 fingerprint `135cec36f49cb8e93b1ab270cd80884676ce8f33'
> 	Adding CA certificate...done
> 	CA Certificate: subject `O=CAcert Inc.,OU=http://www.CAcert.org,CN=CAcert Class 3 Root', issuer `O=Root CA,OU=http://www.cacert.org,CN=CA Cert Signing Authority,EMAIL=support at cacert.org', RSA key 4096 bits, signed using RSA-MD5 (broken!), activated `2005-10-14 07:36:55 UTC', expires `2033-03-28 07:36:55 UTC', SHA-1 fingerprint `db4c4269073fe9c2a37d890a5c1b18c4184e2a2d'
> 	Verifying...done
> 	Cleanup...done
> Exit status...1
> FAIL: chainverify
> crq_key_id |<9>| MPI: length: 128
> 	n: ca3a2589e3160ed921f021b87363c343cee3cd5b0067d0a570332368d9fd054158357ac6f788038ffd5c5622141d32d2b7e2da01604a6296d1adfc998c8575455aa788b8abe84140c9959f7e93cc0681029a9a19a32ab2c144fe08522e4f51dc57c3be9ebfc913d10c60dee23e0edbea9bdd1674cef2b21fdb5c8e37151d471b
> crq_key_id |<9>| MPI: length: 3
> 	e: 010001
> crq_key_id |<9>| MPI: length: 128
> 	d: 45cb99c7244c29a5c133dabf897bc619f21ee772600a749594cae18ebfa5b7199d731fc3ea0cd485eec0dead7659b97fc69d91f665a066b47cfbdab1b8311b8ecd624983977714454fa6800dcd439388b8821e05ac0ca2a543e5a45ae1c095260b912cc307dfa7d3fdb73b06fc32276ea0a6e285d91c214caec2233bc0ee00c1
> crq_key_id |<9>| MPI: length: 64
> 	p: cd8118e03be82746ff43a37f5852c8b395ec24f6dcbd07fdd6e04ababc49771bac1c55e1b148631d14967e2c8740dc9f3f5ae06525ee2222e57351ba9fc1d1a1
> crq_key_id |<9>| MPI: length: 64
> 	q: fbeae7e27a0b099def5ac81fa1c5a0da7f0a7d26bc4e8323f741a6454f5f9b51e4da2a911d0126e94d99b99645376aa2d0602d1c99cba3d7852fc7ec954c973b
> crq_key_id |<9>| MPI: length: 64
> 	u: 3a8e69fc7384e13884d00facb8c92f4ea91e0bba5e0deeb1c8415b5bdd83577293fddc57f2f8b8ade2da6e50a730040ab0263ddecdc92c9d45a4ed71ee3f111c
> crq_key_id |<2>| ASSERT: privkey.c:1416
> crq_key_id |<2>| ASSERT: crq.c:2343
> crq_key_id |<9>| MPI: length: 128
> 	p: ab1718e99dac9af390d6809bd66146dcb3d97aa89a3045078583fb560546b69c93698e96ba90dadc67dc0fe27415b9a553db9eb8f1ed6305c53f16b6a7cce2f2b9fb8173b5cae9e9bf65dbf857c58349e0b9776ecd6ed1ca5ce51e63bb7b6284706b85aaefee31a522a260e07b7ab6a24543471fc7f37d4ea269bc113ae32433
> crq_key_id |<9>| MPI: length: 20
> 	q: c71f6d23687ad6f122db7cd31926e3ec30e4b9cf
> crq_key_id |<9>| MPI: length: 128
> 	g: 75a9e179535333b89c16f27c846578295f3415fe1403cf0e2d8671c66212882909042c0496750c19f98347fab286c84ae9b455a98d5024c82e8a454b533026c4e4897dc78257f480cef1d1200806442891729f6aa76600aaa30a664cfa7ae625e9d114aa0551875b0bc8622193ef9d97dfe89a7c3f9145fedadedf6968c99125
> crq_key_id |<9>| MPI: length: 128
> 	y: 580f579b8351e362be401063686d752a3e5183c9f7eccbd5f1c5d643c97a7b01cc27a6cde63121f9d888af864a064078177f8b22daf4598d7baf512d6779b061ecddc484b81e803b5cb5f072440a9f74533151e879086cf432ab10f2dd304ee384bc5de34f8cbd0e3f7ee0842daafdcee99e6a7472db0c67620ac7d817747147
> crq_key_id |<9>| MPI: length: 20
> 	x: 1da84e1285519979d49134a8c8ff4cd1f95a08ce
> crq_key_id |<2>| ASSERT: privkey.c:1416
> crq_key_id |<2>| ASSERT: crq.c:2343
> Key[RSA] generation ok: 0
> Key ids are identical. OK.
> Key[DSA] generation ok: 0
> Key ids are identical. OK.
> Self test `./crq_key_id' finished with 0 errors
> PASS: crq_key_id
> loop 0
> loop 1
> Self test `./x509sign-verify' finished with 0 errors
> PASS: x509sign-verify
> success!
> PASS: cve-2009-1415
> success!
> PASS: cve-2009-1416
> Handshake established
> *.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
> Self test `./mini-eagain' finished with 0 errors
> PASS: mini-eagain
> MD5 OK
> Self test `./openssl' finished with 0 errors
> PASS: openssl
> 2| PGP: keyring import format 'raw'
> 2| new stream `[temp]'
> 2| new stream fd=5
> 2| ASSERT: stream.c:998
> 2| ASSERT: keydb.c:1039
> 2| ASSERT: keydb.c:1427
> 2| PGP: key not found 00000000
> 2| cache: add entry off=0 type=4
> 2| ASSERT: stream.c:998
> 2| cache: add entry off=555 type=4
> 2| close stream ref=0 `[temp]'
> 2| close stream fd=5
> 2| ASSERT: stream.c:513
> done
> Self test `./openpgp-keyring' finished with 0 errors
> PASS: openpgp-keyring
> PASS: pgps2kgnu
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> client: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 1 certificates.
> Certificate info:
> 	Certificate is valid since: Wed Apr 18 15:29:21 2007
> 	Certificate expires: Thu Apr 17 15:29:21 2008
> 	Certificate serial number: 46261d31 
> Certificate public key: RSA	Certificate version: #3
> 	DN: O=GnuTLS test server,CN=test.gnutls.org
> 	Issuer's DN: CN=GnuTLS test CA
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> client: sent record.
> client: recv returned -37.
> client: doing handshake!
> client: handshake complete, reading again.
> - Received 9 bytes: Hello TLS
> Self test `./x509self' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57700
> server: Handshake was completed
> server: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 0 certificates.
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> server: got data, forcing rehandshake.
> server: rehandshake complete.
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./x509self' finished with 0 errors
> PASS: x509self
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> client: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 1 certificates.
> Certificate info:
> 	Certificate is valid since: Wed Apr 18 15:29:21 2007
> 	Certificate expires: Thu Apr 17 15:29:21 2008
> 	Certificate serial number: 46261d31 
> Certificate public key: RSA	Certificate version: #3
> 	DN: O=GnuTLS test server,CN=test.gnutls.org
> 	Issuer's DN: CN=GnuTLS test CA
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> - Received 9 bytes: Hello TLS
> Self test `./x509signself' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57701
> server: Handshake was completed
> server: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 1 certificates.
> Certificate info:
> 	Certificate is valid since: Wed Apr 18 15:29:27 2007
> 	Certificate expires: Thu Apr 17 15:29:27 2008
> 	Certificate serial number: 46261d37 
> Certificate public key: RSA	Certificate version: #3
> 	DN: CN=GnuTLS test client
> 	Issuer's DN: CN=GnuTLS test CA
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./x509signself' finished with 0 errors
> PASS: x509signself
> server: ready. Listening to port '5556'.
> client: invoked to provide client cert.
> client: imported DN.
> client: got RDN 0.
> client: RND 0 correct.
> client: Handshake was completed
> client: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 1 certificates.
> Certificate info:
> 	Certificate is valid since: Wed Apr 18 15:29:21 2007
> 	Certificate expires: Thu Apr 17 15:29:21 2008
> 	Certificate serial number: 46261d31 
> Certificate public key: RSA	Certificate version: #3
> 	DN: O=GnuTLS test server,CN=test.gnutls.org
> 	Issuer's DN: CN=GnuTLS test CA
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> - Received 9 bytes: Hello TLS
> Self test `./x509dn' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57702
> server: Handshake was completed
> server: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> Peer provided 0 certificates.
> - Protocol: TLS1.1
> - Certificate Type: X.509
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./x509dn' finished with 0 errors
> PASS: x509dn
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> client: TLS version is: TLS1.1
> - Received 9 bytes: Hello TLS
> Self test `./anonself' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57703
> server: Handshake was completed
> server: TLS version is: TLS1.1
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./anonself' finished with 0 errors
> PASS: anonself
> Launched...
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> Self test `./pskself' finished with 0 errors
> Launched...
> server: ready. Listening to port '5556'.
> server: connection from 127.0.0.1, port 57704
> psk: username test
> server: Handshake was completed
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./pskself' finished with 0 errors
> PASS: pskself
> Launched, generating DH parameters...
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> - Received 9 bytes: Hello TLS
> Self test `./dhepskself' finished with 0 errors
> Launched, generating DH parameters...
> server: ready. Listening to port '5556'.
> server: connection from 127.0.0.1, port 57705
> psk callback to get test's password
> server: Handshake was completed
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./dhepskself' finished with 0 errors
> PASS: dhepskself
> server: ready. Listening to port '5556'
> client: Handshake was completed
> client: TLS/IA handshake
> client: new application phase
> client: sending 38 bytes AVP: `client's first AVP, next will be empty'
> client: received 16 bytes AVP: `first server AVP'
> client: sending 0 bytes AVP: `'
> client: received 65 bytes AVP: `second server AVP, next will be empty, then a intermediate finish'
> client: sending 10 bytes AVP: `client avp'
> client: received 0 bytes AVP: `'
> client: sending 36 bytes AVP: `final client AVP, we'll restart next'
> client: new application phase
> client: sending 38 bytes AVP: `client's first AVP, next will be empty'
> client: received 64 bytes AVP: `server avp, after intermediate finish, next another intermediate'
> client: sending 0 bytes AVP: `'
> client: new application phase
> client: sending 10 bytes AVP: `client avp'
> client: received 41 bytes AVP: `server avp, next will be the finish phase'
> client: sending 36 bytes AVP: `final client AVP, we'll restart next'
> client: TLS/IA Handshake was completed
> Self test `./tlsia' finished with 0 errors
> server: ready. Listening to port '5556'
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57706
> server: Handshake was completed
> server: TLS/IA handshake
> server: received 38 bytes AVP: `client's first AVP, next will be empty'
> server: sending 16 bytes AVP: `first server AVP'
> server: received 0 bytes AVP: `'
> server: sending 65 bytes AVP: `second server AVP, next will be empty, then a intermediate finish'
> server: received 10 bytes AVP: `client avp'
> server: sending 0 bytes AVP: `'
> server: received 36 bytes AVP: `final client AVP, we'll restart next'
> server: Sending IntermediatePhaseFinished...
> server: received 38 bytes AVP: `client's first AVP, next will be empty'
> server: sending 64 bytes AVP: `server avp, after intermediate finish, next another intermediate'
> server: received 0 bytes AVP: `'
> server: Sending IntermediatePhaseFinished...
> server: received 10 bytes AVP: `client avp'
> server: sending 41 bytes AVP: `server avp, next will be the finish phase'
> server: received 36 bytes AVP: `final client AVP, we'll restart next'
> server: Sending FinalPhaseFinished...
> server: TLS/IA Handshake was completed
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./tlsia' finished with 0 errors
> PASS: tlsia
> server: ready. Listening to port '5556'.
> client: Handshake was completed
> client: Handshake was completed
> - Previous session was resumed
> global stop
> Self test `./resume' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, generating DH parameters...
> server: connection from 127.0.0.1, port 57707
> resume db storing... (32-449)
> server: Handshake was completed
> server: Peer has closed the GNUTLS connection
> server: connection from 127.0.0.1, port 57708
> resume db fetch... (32)
> resume db fetch... return info
> resume db storing... (32-449)
> server: Handshake was completed
> server: Peer has closed the GNUTLS connection
> server: finished
> global stop
> Self test `./resume' finished with 0 errors
> PASS: resume
> success: gnutls_psk_netconf_derive_key
> success: match.
> Self test `./netconf-psk' finished with 0 errors
> PASS: netconf-psk
> PASS: setcredcrash
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=6
> client |<2>| ASSERT: armor.c:325
> client |<2>| armor filter: decode
> client |<2>| filter [temp] [read]: type=1 rc=0
> client |<2>| replace stream fd=6 with fd=7
> client |<2>| ASSERT: misc.c:321
> client |<2>| ASSERT: stream.c:998
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| free armor filter
> client |<2>| ASSERT: stream.c:513
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=6
> client |<2>| ASSERT: armor.c:325
> client |<2>| armor filter: decode
> client |<2>| filter [temp] [read]: type=1 rc=0
> client |<2>| replace stream fd=6 with fd=7
> client |<2>| ASSERT: stream.c:998
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| free armor filter
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: privkey.c:1138
> client |<2>| Importing Openpgp key and using main openpgp key.
> client |<2>| ASSERT: pgp.c:1554
> client |<2>| Importing Openpgp cert and using main openpgp key
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=6
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| ASSERT: kbnode.c:561
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=6
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: pgp.c:164
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=6
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=6
> client |<2>| ASSERT: stream.c:513
> client |<2>| EXT[0x2254f50]: Sending extension CERT_TYPE
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| EXT[0x2254f50]: Received extension 'CERT_TYPE/9'
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| ASSERT: stream.c:998
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| Importing Openpgp cert and using openpgp sub key: 837b6fb42e0fe176
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| write packet pkttype=14
> client |<2>| write packet pkttype=2
> client |<2>| ASSERT: kbnode.c:561
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: pgp.c:164
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| write packet pkttype=14
> client |<2>| write packet pkttype=2
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| ASSERT: stream.c:998
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| Importing Openpgp cert and using openpgp sub key: 837b6fb42e0fe176
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| write packet pkttype=14
> client |<2>| write packet pkttype=2
> client |<2>| ASSERT: kbnode.c:561
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: pgp.c:164
> client |<2>| new stream `[temp]'
> client |<2>| new stream fd=7
> client |<2>| write packet pkttype=6
> client |<2>| write packet pkttype=13
> client |<2>| write packet pkttype=2
> client |<2>| write packet pkttype=14
> client |<2>| write packet pkttype=2
> client |<2>| close stream ref=0 `[temp]'
> client |<2>| close stream fd=7
> client |<2>| ASSERT: stream.c:513
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> client |<2>| ASSERT: gnutls_cipher.c:204
> server: ready. Listening to port '5556'.
> Setting key files...
> Connecting...
> client: Handshake was completed
> client: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> - Protocol: TLS1.1
> - Certificate Type: OPENPGP
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> - Received 9 bytes: Hello TLS
> Self test `./openpgpself' finished with 0 errors
> server: ready. Listening to port '5556'.
> Launched, setting DH parameters...
> server: connection from 127.0.0.1, port 57709
> server: Handshake was completed
> server: TLS version is: TLS1.1
> - Key Exchange: DHE-RSA
> 
> - Ephemeral DH using prime of 1024 bits
> - Protocol: TLS1.1
> - Certificate Type: OPENPGP
> - Compression: NULL
> - Cipher: AES-128-CBC
> - MAC: SHA1
> server: Peer has closed the GNUTLS connection
> server: finished
> Self test `./openpgpself' finished with 0 errors
> PASS: openpgpself
> make[4]: *** [check-TESTS] Error 1

The full build log is available from:
   http://people.debian.org/~lucas/logs/2009/10/28/gnutls26_2.8.4-1_lsid64.buildlog

A list of current common problems and possible solutions is available at 
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on about 50 AMD64 nodes
of the Grid'5000 platform, using a clean chroot.  Internet was not
accessible from the build systems.

-- 
| Lucas Nussbaum
| lucas at lucas-nussbaum.net   http://www.lucas-nussbaum.net/ |
| jabber: lucas at nussbaum.fr             GPG: 1024D/023B3F4F |





More information about the Pkg-gnutls-maint mailing list