START lib/libssl/interop 2021-01-14T06:26:15Z ===> libressl ==== run-self-client-server ==== cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../client.c cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../util.c cc -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -DLIBRESSL_HAS_TLS1_3 -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -c /usr/src/regress/lib/libssl/interop/libressl/../server.c cc -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ........................+++++ ..........+++++ writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd client >ldd-client.out # check that client is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-client.out grep -q /usr/lib/libssl.so ldd-client.out # check that client is not linked with OpenSSL ! grep /usr/local/lib/ ldd-client.out ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' client-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 3.3.1 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH= ldd server >ldd-server.out # check that server is linked with LibreSSL grep -q /usr/lib/libcrypto.so ldd-server.out grep -q /usr/lib/libssl.so ldd-server.out # check that server is not linked with OpenSSL ! grep /usr/local/lib/ ldd-server.out ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is LibreSSL grep 'SSLEAY_VERSION: LibreSSL' server-self.out SSLeay_version SSLEAY_VERSION: LibreSSL 3.3.1 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH= ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH= ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that LibreSSL protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> openssl ==== run-self-client-server ==== cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl -c /usr/src/regress/lib/libssl/interop/openssl/../client.c cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl -c /usr/src/regress/lib/libssl/interop/openssl/../util.c cc -L /usr/local/lib/eopenssl -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl -c /usr/src/regress/lib/libssl/interop/openssl/../server.c cc -L /usr/local/lib/eopenssl -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .....+++++ .................................................+++++ writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl ldd client >ldd-client.out # check that client is linked with OpenSSL grep -q /usr/local/lib/eopenssl/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.0.2 grep 'SSLEAY_VERSION: OpenSSL 1.0.2' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.0.2u 20 Dec 2019 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.0.2 protocol version is TLS 1.2 grep 'Protocol *: TLSv1.2' client-self.out Protocol : TLSv1.2 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl ldd server >ldd-server.out # check that server is linked with OpenSSL grep -q /usr/local/lib/eopenssl/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.0.2 grep 'SSLEAY_VERSION: OpenSSL 1.0.2' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.0.2u 20 Dec 2019 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.0.2 protocol version is TLS 1.2 grep 'Protocol *: TLSv1.2' server-self.out Protocol : TLSv1.2 ===> openssl11 ==== run-self-client-server ==== cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../client.c cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../util.c cc -L /usr/local/lib/eopenssl11 -o client client.o util.o -lssl -lcrypto cc -O2 -pipe -Wall -Wpointer-arith -Wuninitialized -Wstrict-prototypes -Wmissing-prototypes -Wunused -Wsign-compare -Wshadow -MD -MP -I /usr/local/include/eopenssl11 -c /usr/src/regress/lib/libssl/interop/openssl11/../server.c cc -L /usr/local/lib/eopenssl11 -o server server.o util.o -lssl -lcrypto openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ........................+++++ ..................................................................................+++++ writing new private key to '127.0.0.1.key' ----- # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out ==== run-ldd-client ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd client >ldd-client.out # check that client is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-client.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-client.out # check that client is not linked with LibreSSL ! grep -v libc.so ldd-client.out | grep /usr/lib/ ==== run-version-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' client-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1i 8 Dec 2020 ==== run-protocol-client ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' client-self.out Protocol : TLSv1.3 ==== run-ldd-server ==== # programs must be linked with correct libraries LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ldd server >ldd-server.out # check that server is linked with OpenSSL 1.1 grep -q /usr/local/lib/eopenssl11/libcrypto.so ldd-server.out grep -q /usr/local/lib/eopenssl11/libssl.so ldd-server.out # check that server is not linked with LibreSSL ! grep -v libc.so ldd-server.out | grep /usr/lib/ ==== run-version-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that runtime version is OpenSSL 1.1 grep 'SSLEAY_VERSION: OpenSSL 1.1' server-self.out SSLeay_version SSLEAY_VERSION: OpenSSL 1.1.1i 8 Dec 2020 ==== run-protocol-server ==== # check that tls client and server work together LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./server >server-self.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ./client >client-self.out `sed -n 's/listen sock: //p' server-self.out` # check that the client run successfully to the end grep -q '^success$' client-self.out # client must have read server greeting grep -q '^<<< greeting$' client-self.out # check that the server child run successfully to the end grep -q '^success$' server-self.out # server must have read client hello grep -q '^<<< hello$' server-self.out # check that OpenSSL 1.1 protocol version is TLS 1.3 grep 'Protocol *: TLSv1.3' server-self.out Protocol : TLSv1.3 ===> netcat ==== run-netcat-client-libressl-server-nc ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .......................+++++ .........................+++++ writing new private key to '127.0.0.1.key' ----- echo "greeting" | nc >server-netcat-client-libressl-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-netcat-client-libressl-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-libressl-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-libressl-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-libressl-server-nc.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-openssl-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-netcat-client-openssl-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl-server-nc.out ==== run-protocol-client-openssl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl-server-nc.out Protocol : TLSv1.2 ==== run-netcat-client-openssl11-server-nc ==== echo "greeting" | nc >server-netcat-client-openssl11-server-nc.out -l -c -C 127.0.0.1.crt -K 127.0.0.1.key 127.0.0.1 0 & for i in `jot 1000`; do fstat -p $! >netcat.fstat; grep -q ' stream tcp .*:[1-9][0-9]*$' netcat.fstat && exit 0; done; exit 1 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-netcat-client-openssl11-server-nc.out `sed -n 's/.* stream tcp .*:/127.0.0.1 /p' netcat.fstat` # check that the client run successfully to the end grep -q '^success$' client-netcat-client-openssl11-server-nc.out # client must have read server greeting grep -q '^<<< greeting$' client-netcat-client-openssl11-server-nc.out # netstat server must have read client hello grep -q '^hello$' server-netcat-client-openssl11-server-nc.out ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-netcat-client-nc-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-netcat-client-nc-server-libressl.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-libressl.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-libressl.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-libressl.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-libressl.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-libressl.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-libressl.out ==== run-netcat-client-nc-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-netcat-client-nc-server-openssl.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl.out ==== run-netcat-client-nc-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-netcat-client-nc-server-openssl11.out 127.0.0.1 0 echo "hello" | nc >client-netcat-client-nc-server-openssl11.out -c -R 127.0.0.1.crt `sed -n 's/listen sock: //p' server-netcat-client-nc-server-openssl11.out` # check that the server child run successfully to the end grep -q '^success$' server-netcat-client-nc-server-openssl11.out || { sleep 1; grep -q '^success$' server-netcat-client-nc-server-openssl11.out; } # server must have read client hello grep -q '^<<< hello$' server-netcat-client-nc-server-openssl11.out # client must have read server greeting grep -q '^greeting$' client-netcat-client-nc-server-openssl11.out ==== run-protocol-client-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-libressl-server-nc.out Protocol : TLSv1.3 ==== run-protocol-client-openssl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl-server-nc.out Protocol : TLSv1.2 ==== run-protocol-client-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' client-netcat-client-openssl11-server-nc.out Protocol : TLSv1.3 ==== run-protocol-server-libressl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-libressl.out Protocol : TLSv1.3 ==== run-protocol-server-openssl ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl.out Protocol : TLSv1.2 ==== run-protocol-server-openssl11 ==== # check that LibTLS protocol version is TLS 1.2 or TLS 1.3 grep 'Protocol *: TLSv1.[23]' server-netcat-client-nc-server-openssl11.out Protocol : TLSv1.3 ===> session ==== run-session-client-libressl-server-libressl ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key .....+++++ .............................................................................................................+++++ writing new private key to '127.0.0.1.key' ----- # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-session-client-libressl-server-openssl.out -ss 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-session-client-libressl-server-openssl.out -ss `sed -n 's/listen sock: //p' server-session-client-libressl-server-openssl.out` grep '^success$' server-session-client-libressl-server-openssl.out || { sleep 1; grep '^success$' server-session-client-libressl-server-openssl.out; } success grep '^success$' client-session-client-libressl-server-openssl.out success grep '^session 2: new$' server-session-client-libressl-server-openssl.out session 2: new grep '^session 2: new$' client-session-client-libressl-server-openssl.out session 2: new grep '^session 1: reuse$' server-session-client-libressl-server-openssl.out session 1: reuse grep '^session 1: reuse$' client-session-client-libressl-server-openssl.out session 1: reuse grep '^session 0: reuse$' server-session-client-libressl-server-openssl.out session 0: reuse grep '^session 0: reuse$' client-session-client-libressl-server-openssl.out session 0: reuse ==== run-session-client-libressl-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-session-client-openssl-server-libressl.out -ss 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-session-client-openssl-server-libressl.out -ss `sed -n 's/listen sock: //p' server-session-client-openssl-server-libressl.out` grep '^success$' server-session-client-openssl-server-libressl.out || { sleep 1; grep '^success$' server-session-client-openssl-server-libressl.out; } success grep '^success$' client-session-client-openssl-server-libressl.out success grep '^session 2: new$' server-session-client-openssl-server-libressl.out session 2: new grep '^session 2: new$' client-session-client-openssl-server-libressl.out session 2: new grep '^session 1: reuse$' server-session-client-openssl-server-libressl.out session 1: reuse grep '^session 1: reuse$' client-session-client-openssl-server-libressl.out session 1: reuse grep '^session 0: reuse$' server-session-client-openssl-server-libressl.out session 0: reuse grep '^session 0: reuse$' client-session-client-openssl-server-libressl.out session 0: reuse ==== run-session-client-openssl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-session-client-openssl-server-openssl.out -ss 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-session-client-openssl-server-openssl.out -ss `sed -n 's/listen sock: //p' server-session-client-openssl-server-openssl.out` grep '^success$' server-session-client-openssl-server-openssl.out || { sleep 1; grep '^success$' server-session-client-openssl-server-openssl.out; } success grep '^success$' client-session-client-openssl-server-openssl.out success grep '^session 2: new$' server-session-client-openssl-server-openssl.out session 2: new grep '^session 2: new$' client-session-client-openssl-server-openssl.out session 2: new grep '^session 1: reuse$' server-session-client-openssl-server-openssl.out session 1: reuse grep '^session 1: reuse$' client-session-client-openssl-server-openssl.out session 1: reuse grep '^session 0: reuse$' server-session-client-openssl-server-openssl.out session 0: reuse grep '^session 0: reuse$' client-session-client-openssl-server-openssl.out session 0: reuse ==== run-session-client-openssl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-session-client-openssl-server-openssl11.out -ss 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-session-client-openssl-server-openssl11.out -ss `sed -n 's/listen sock: //p' server-session-client-openssl-server-openssl11.out` grep '^success$' server-session-client-openssl-server-openssl11.out || { sleep 1; grep '^success$' server-session-client-openssl-server-openssl11.out; } success grep '^success$' client-session-client-openssl-server-openssl11.out success grep '^session 2: new$' server-session-client-openssl-server-openssl11.out session 2: new grep '^session 2: new$' client-session-client-openssl-server-openssl11.out session 2: new grep '^session 1: reuse$' server-session-client-openssl-server-openssl11.out session 1: reuse grep '^session 1: reuse$' client-session-client-openssl-server-openssl11.out session 1: reuse grep '^session 0: reuse$' server-session-client-openssl-server-openssl11.out session 0: reuse grep '^session 0: reuse$' client-session-client-openssl-server-openssl11.out session 0: reuse ==== run-session-client-openssl11-server-libressl ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ==== run-session-client-openssl11-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-session-client-openssl11-server-openssl.out -ss 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-session-client-openssl11-server-openssl.out -ss `sed -n 's/listen sock: //p' server-session-client-openssl11-server-openssl.out` grep '^success$' server-session-client-openssl11-server-openssl.out || { sleep 1; grep '^success$' server-session-client-openssl11-server-openssl.out; } success grep '^success$' client-session-client-openssl11-server-openssl.out success grep '^session 2: new$' server-session-client-openssl11-server-openssl.out session 2: new grep '^session 2: new$' client-session-client-openssl11-server-openssl.out session 2: new grep '^session 1: reuse$' server-session-client-openssl11-server-openssl.out session 1: reuse grep '^session 1: reuse$' client-session-client-openssl11-server-openssl.out session 1: reuse grep '^session 0: reuse$' server-session-client-openssl11-server-openssl.out session 0: reuse grep '^session 0: reuse$' client-session-client-openssl11-server-openssl.out session 0: reuse ==== run-session-client-openssl11-server-openssl11 ==== # TLS 1.3 needs some extra setup for session reuse DISABLED ===> botan SKIPPED ===> version ==== run-version-client-libressl-any-server-libressl-any ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ....................................+++++ ...........................................................+++++ writing new private key to '127.0.0.1.key' ----- LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-any.out ==== check-version-client-libressl-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-libressl-any.out ==== run-version-client-libressl-any-server-openssl-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-any-server-openssl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl-any.out` grep -q '^success$' server-version-client-libressl-any-server-openssl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl-any.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl-any.out ==== check-version-client-libressl-any-server-openssl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-openssl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-openssl-any.out ==== run-version-client-libressl-any-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-any.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-any.out ==== check-version-client-libressl-any-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-openssl11-any.out ==== run-version-client-openssl-any-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-openssl-any-server-libressl-any.out` grep -q '^success$' server-version-client-openssl-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl-any-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl-any-server-libressl-any.out ==== check-version-client-openssl-any-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl-any-server-libressl-any.out ==== run-version-client-openssl11-any-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-any.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-any.out ==== check-version-client-openssl11-any-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-libressl-any.out ==== run-version-client-libressl-any-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1.out ==== check-version-client-libressl-any-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-any-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-any-server-libressl-TLS1.out ==== run-version-client-libressl-any-server-openssl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-any-server-openssl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl-TLS1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl-TLS1.out` grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl-TLS1.out ==== check-version-client-libressl-any-server-openssl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-any-server-openssl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-any-server-openssl-TLS1.out ==== run-version-client-libressl-any-server-openssl11-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1.out ==== check-version-client-libressl-any-server-openssl11-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-any-server-openssl11-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-any-server-openssl11-TLS1.out ==== run-version-client-openssl-any-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-any-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-any-server-libressl-TLS1.out `sed -n 's/listen sock: //p' server-version-client-openssl-any-server-libressl-TLS1.out` grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-openssl-any-server-libressl-TLS1.out ==== check-version-client-openssl-any-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl-any-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl-any-server-libressl-TLS1.out ==== run-version-client-openssl11-any-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1.out ==== check-version-client-openssl11-any-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl11-any-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl11-any-server-libressl-TLS1.out ==== run-version-client-libressl-any-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_1.out ==== check-version-client-libressl-any-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-any-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-any-server-libressl-TLS1_1.out ==== run-version-client-libressl-any-server-openssl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-any-server-openssl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl-TLS1_1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl-TLS1_1.out` grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl-TLS1_1.out ==== check-version-client-libressl-any-server-openssl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-any-server-openssl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-any-server-openssl-TLS1_1.out ==== run-version-client-libressl-any-server-openssl11-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_1.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_1.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_1.out ==== check-version-client-libressl-any-server-openssl11-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-any-server-openssl11-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-any-server-openssl11-TLS1_1.out ==== run-version-client-openssl-any-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-any-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-any-server-libressl-TLS1_1.out `sed -n 's/listen sock: //p' server-version-client-openssl-any-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-openssl-any-server-libressl-TLS1_1.out ==== check-version-client-openssl-any-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl-any-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl-any-server-libressl-TLS1_1.out ==== run-version-client-openssl11-any-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_1.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_1.out ==== check-version-client-openssl11-any-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl11-any-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl11-any-server-libressl-TLS1_1.out ==== run-version-client-libressl-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_2.out ==== check-version-client-libressl-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-any-server-openssl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-any-server-openssl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl-TLS1_2.out ==== check-version-client-libressl-any-server-openssl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-openssl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-openssl-TLS1_2.out ==== run-version-client-libressl-any-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_2.out ==== check-version-client-libressl-any-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-any-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-any-server-openssl11-TLS1_2.out ==== run-version-client-openssl-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl-any-server-libressl-TLS1_2.out ==== check-version-client-openssl-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl-any-server-libressl-TLS1_2.out ==== run-version-client-openssl11-any-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_2.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_2.out ==== check-version-client-openssl11-any-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-any-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-any-server-libressl-TLS1_2.out ==== run-version-client-libressl-any-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-any-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-libressl-TLS1_3.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-libressl-TLS1_3.out` grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-libressl-TLS1_3.out; } grep -q '^success$' client-version-client-libressl-any-server-libressl-TLS1_3.out ==== check-version-client-libressl-any-server-libressl-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-libressl-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-libressl-TLS1_3.out ==== run-version-client-libressl-any-server-openssl11-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-any-server-openssl11-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-any-server-openssl11-TLS1_3.out `sed -n 's/listen sock: //p' server-version-client-libressl-any-server-openssl11-TLS1_3.out` grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-libressl-any-server-openssl11-TLS1_3.out; } grep -q '^success$' client-version-client-libressl-any-server-openssl11-TLS1_3.out ==== check-version-client-libressl-any-server-openssl11-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-any-server-openssl11-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-any-server-openssl11-TLS1_3.out ==== run-version-client-openssl11-any-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-any-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-any-server-libressl-TLS1_3.out `sed -n 's/listen sock: //p' server-version-client-openssl11-any-server-libressl-TLS1_3.out` grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-any-server-libressl-TLS1_3.out; } grep -q '^success$' client-version-client-openssl11-any-server-libressl-TLS1_3.out ==== check-version-client-openssl11-any-server-libressl-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-any-server-libressl-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-any-server-libressl-TLS1_3.out ==== run-version-client-libressl-TLS1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-libressl-any.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-libressl-any.out ==== check-version-client-libressl-TLS1-server-libressl-any ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-libressl-any.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-libressl-any.out ==== run-version-client-libressl-TLS1-server-openssl-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1-server-openssl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl-any.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl-any.out` grep -q '^success$' server-version-client-libressl-TLS1-server-openssl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-openssl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-openssl-any.out ==== check-version-client-libressl-TLS1-server-openssl-any ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-openssl-any.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-openssl-any.out ==== run-version-client-libressl-TLS1-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl11-any.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-openssl11-any.out ==== check-version-client-libressl-TLS1-server-openssl11-any ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-openssl11-any.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-openssl11-any.out ==== run-version-client-openssl-TLS1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1-server-libressl-any.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1-server-libressl-any.out` grep -q '^success$' server-version-client-openssl-TLS1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl-TLS1-server-libressl-any.out ==== check-version-client-openssl-TLS1-server-libressl-any ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl-TLS1-server-libressl-any.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl-TLS1-server-libressl-any.out ==== run-version-client-openssl11-TLS1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1-server-libressl-any.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1-server-libressl-any.out ==== check-version-client-openssl11-TLS1-server-libressl-any ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl11-TLS1-server-libressl-any.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl11-TLS1-server-libressl-any.out ==== run-version-client-libressl-TLS1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-libressl-TLS1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-libressl-TLS1.out` grep -q '^success$' server-version-client-libressl-TLS1-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-libressl-TLS1.out ==== check-version-client-libressl-TLS1-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-libressl-TLS1.out ==== run-version-client-libressl-TLS1-server-openssl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1-server-openssl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl-TLS1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl-TLS1.out` grep -q '^success$' server-version-client-libressl-TLS1-server-openssl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-openssl-TLS1.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-openssl-TLS1.out ==== check-version-client-libressl-TLS1-server-openssl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-openssl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-openssl-TLS1.out ==== run-version-client-libressl-TLS1-server-openssl11-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1-server-openssl11-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl11-TLS1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl11-TLS1.out` grep -q '^success$' server-version-client-libressl-TLS1-server-openssl11-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1-server-openssl11-TLS1.out; } grep -q '^success$' client-version-client-libressl-TLS1-server-openssl11-TLS1.out ==== check-version-client-libressl-TLS1-server-openssl11-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-libressl-TLS1-server-openssl11-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-libressl-TLS1-server-openssl11-TLS1.out ==== run-version-client-openssl-TLS1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1-server-libressl-TLS1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1-server-libressl-TLS1.out` grep -q '^success$' server-version-client-openssl-TLS1-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-openssl-TLS1-server-libressl-TLS1.out ==== check-version-client-openssl-TLS1-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl-TLS1-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl-TLS1-server-libressl-TLS1.out ==== run-version-client-openssl11-TLS1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1-server-libressl-TLS1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1-server-libressl-TLS1.out` grep -q '^success$' server-version-client-openssl11-TLS1-server-libressl-TLS1.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1-server-libressl-TLS1.out; } grep -q '^success$' client-version-client-openssl11-TLS1-server-libressl-TLS1.out ==== check-version-client-openssl11-TLS1-server-libressl-TLS1 ==== Protocol : TLSv1 Protocol : TLSv1 grep -q ' Protocol *: TLSv1$' client-version-client-openssl11-TLS1-server-libressl-TLS1.out grep -q ' Protocol *: TLSv1$' server-version-client-openssl11-TLS1-server-libressl-TLS1.out ==== run-version-client-libressl-TLS1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-libressl-TLS1_1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-libressl-TLS1_1.out` 8519541930560:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: 13910463699520:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 server: client: SSL_connect -1 SSL_accept -1 ==== run-version-client-libressl-TLS1-server-openssl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1-server-openssl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl-TLS1_1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl-TLS1_1.out` 11720872181600:error:1408A10B:SSL routines:ssl3_get_client_hello:wrong version number:s3_srvr.c:969: server: SSL_accept -1 3447454579264:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-libressl-TLS1-server-openssl11-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1-server-openssl11-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl11-TLS1_1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl11-TLS1_1.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 15533337811520:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl-TLS1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1-server-libressl-TLS1_1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1-server-libressl-TLS1_1.out` 8743272239968:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 15502863276608:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-openssl11-TLS1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1-server-libressl-TLS1_1.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1-server-libressl-TLS1_1.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 13759160900160:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-libressl-TLS1_2.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-libressl-TLS1_2.out` 1618532358720:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: 680737331776:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 SSL_accept -1client: SSL_connect -1 ==== run-version-client-libressl-TLS1-server-openssl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1-server-openssl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl-TLS1_2.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl-TLS1_2.out` 2297767434848:error:1408A10B:SSL routines:ssl3_get_client_hello:wrong version number:s3_srvr.c:969: server: SSL_accept -1 10814837037632:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-libressl-TLS1-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl11-TLS1_2.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl11-TLS1_2.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 2116434680384:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl-TLS1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1-server-libressl-TLS1_2.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1-server-libressl-TLS1_2.out` 7151734271712:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 5577738181184:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-openssl11-TLS1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1-server-libressl-TLS1_2.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1-server-libressl-TLS1_2.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 13235854600768:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-libressl-TLS1_3.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-libressl-TLS1_3.out` 240379275840:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: 1489427544640:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 server: SSL_accept -1client: SSL_connect -1 ==== run-version-client-libressl-TLS1-server-openssl11-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1-server-openssl11-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1-server-openssl11-TLS1_3.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1-server-openssl11-TLS1_3.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 14012950030912:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1-server-libressl-TLS1_3.out -V TLS1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1-server-libressl-TLS1_3.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 2912798681664:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-libressl-any.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-libressl-any.out ==== check-version-client-libressl-TLS1_1-server-libressl-any ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-libressl-any.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-libressl-any.out ==== run-version-client-libressl-TLS1_1-server-openssl-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_1-server-openssl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl-any.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-openssl-any.out ==== check-version-client-libressl-TLS1_1-server-openssl-any ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-openssl-any.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-openssl-any.out ==== run-version-client-libressl-TLS1_1-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_1-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl11-any.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-openssl11-any.out ==== check-version-client-libressl-TLS1_1-server-openssl11-any ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-openssl11-any.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-openssl11-any.out ==== run-version-client-openssl-TLS1_1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_1-server-libressl-any.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_1-server-libressl-any.out` grep -q '^success$' server-version-client-openssl-TLS1_1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1_1-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl-TLS1_1-server-libressl-any.out ==== check-version-client-openssl-TLS1_1-server-libressl-any ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl-TLS1_1-server-libressl-any.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl-TLS1_1-server-libressl-any.out ==== run-version-client-openssl11-TLS1_1-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_1-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_1-server-libressl-any.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_1-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_1-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_1-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_1-server-libressl-any.out ==== check-version-client-openssl11-TLS1_1-server-libressl-any ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl11-TLS1_1-server-libressl-any.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl11-TLS1_1-server-libressl-any.out ==== run-version-client-libressl-TLS1_1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-libressl-TLS1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-libressl-TLS1.out` 17292873964096:error:1400410A:SSL routines:CONNECT_CR_SRVR_HELLO:wrong ssl version:/usr/src/lib/libssl/ssl_clnt.c:907: client: SSL_connect -1 15952419568192:error:1403742E:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert protocol version:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 70 server: SSL_accept 0 ==== run-version-client-libressl-TLS1_1-server-openssl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_1-server-openssl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl-TLS1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl-TLS1.out` 16414531242560:error:1400410A:SSL routines:CONNECT_CR_SRVR_HELLO:wrong ssl version:/usr/src/lib/libssl/ssl_clnt.c:907: client: 2252799345120:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:s3_pkt.c:1498:SSL alert number 70 SSL_connect -1 server: SSL_accept 0 ==== run-version-client-libressl-TLS1_1-server-openssl11-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_1-server-openssl11-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl11-TLS1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl11-TLS1.out` 15530429405760:error:1400410A:SSL routines:CONNECT_CR_SRVR_HELLO:wrong ssl version:/usr/src/lib/libssl/ssl_clnt.c:907: 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 server: SSL_accept -1 ==== run-version-client-openssl-TLS1_1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_1-server-libressl-TLS1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_1-server-libressl-TLS1.out` 12414752310112:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 3990979332672:error:1403742E:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert protocol version:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 70 server: SSL_accept 0 ==== run-version-client-openssl11-TLS1_1-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_1-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_1-server-libressl-TLS1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_1-server-libressl-TLS1.out` 0:error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol:ssl/statem/statem_lib.c:1947: client: SSL_connect -1 4249204042304:error:1403710B:SSL routines:ACCEPT_SR_KEY_EXCH:wrong version number:/usr/src/lib/libssl/ssl_pkt.c:373: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out ==== check-version-client-libressl-TLS1_1-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-libressl-TLS1_1.out ==== run-version-client-libressl-TLS1_1-server-openssl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out ==== check-version-client-libressl-TLS1_1-server-openssl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-openssl-TLS1_1.out ==== run-version-client-libressl-TLS1_1-server-openssl11-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out` grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out; } grep -q '^success$' client-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out ==== check-version-client-libressl-TLS1_1-server-openssl11-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_1.out ==== run-version-client-openssl-TLS1_1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out ==== check-version-client-openssl-TLS1_1-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl-TLS1_1-server-libressl-TLS1_1.out ==== run-version-client-openssl11-TLS1_1-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out` grep -q '^success$' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out; } grep -q '^success$' client-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out ==== check-version-client-openssl11-TLS1_1-server-libressl-TLS1_1 ==== Protocol : TLSv1.1 Protocol : TLSv1.1 grep -q ' Protocol *: TLSv1.1$' client-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out grep -q ' Protocol *: TLSv1.1$' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_1.out ==== run-version-client-libressl-TLS1_1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-libressl-TLS1_2.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-libressl-TLS1_2.out` 7946685176384:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 8336614136384:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: client: SSL_connect -1 server: SSL_accept -1 ==== run-version-client-libressl-TLS1_1-server-openssl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_1-server-openssl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl-TLS1_2.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl-TLS1_2.out` 15126100071392:error:1408A10B:SSL routines:ssl3_get_client_hello:wrong version number:s3_srvr.c:969: server: SSL_accept -1 3689301121600:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-libressl-TLS1_1-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_1-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl11-TLS1_2.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_2.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 1946867358272:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl-TLS1_1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_1-server-libressl-TLS1_2.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_1-server-libressl-TLS1_2.out` 15099225083360:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 15467491772992:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-openssl11-TLS1_1-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_1-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_1-server-libressl-TLS1_2.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_2.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 11968560228928:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_1-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_1-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-libressl-TLS1_3.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-libressl-TLS1_3.out` 1296589367872:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 15057763142208:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-libressl-TLS1_1-server-openssl11-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_1-server-openssl11-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_1-server-openssl11-TLS1_3.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_1-server-openssl11-TLS1_3.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 8345398807104:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1_1-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_1-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_1-server-libressl-TLS1_3.out -V TLS1_1 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_1-server-libressl-TLS1_3.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 9275619150400:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-any.out ==== check-version-client-libressl-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-openssl-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_2-server-openssl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl-any.out ==== check-version-client-libressl-TLS1_2-server-openssl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl-any.out ==== run-version-client-libressl-TLS1_2-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-any.out ==== check-version-client-libressl-TLS1_2-server-openssl11-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-any.out ==== run-version-client-openssl-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-openssl-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl-TLS1_2-server-libressl-any.out ==== check-version-client-openssl-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl-TLS1_2-server-libressl-any.out ==== run-version-client-openssl11-TLS1_2-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-any.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-any.out ==== check-version-client-openssl11-TLS1_2-server-libressl-any ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-any.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-any.out ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1.out` 8501088172608:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: SSL_connect -1 8075638991424:error:1403710B:SSL routines:ACCEPT_SR_KEY_EXCH:wrong version number:/usr/src/lib/libssl/ssl_pkt.c:373: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-openssl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_2-server-openssl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl-TLS1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl-TLS1.out` 2178190922080:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: server: SSL_accept -1 11723139152448:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: SSL_connect -1 ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1.out` 9472571005504:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: 0:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:ssl/record/ssl3_record.c:299: SSL_connect -1 server: SSL_accept -1 ==== run-version-client-openssl-TLS1_2-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_2-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_2-server-libressl-TLS1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_2-server-libressl-TLS1.out` 14323030602656:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 3830006979136:error:1403742E:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert protocol version:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 70 server: SSL_accept 0 ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1.out` 0:error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol:ssl/statem/statem_lib.c:1947: client: SSL_connect -1 15991166388800:error:1403710B:SSL routines:ACCEPT_SR_KEY_EXCH:wrong version number:/usr/src/lib/libssl/ssl_pkt.c:373: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_1.out` 1422822709824:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: SSL_connect -1 15041436449344:error:1403710B:SSL routines:ACCEPT_SR_KEY_EXCH:wrong version number:/usr/src/lib/libssl/ssl_pkt.c:373: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-openssl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_2-server-openssl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl-TLS1_1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl-TLS1_1.out` 6098294004288:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: 664728677600:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_1.out` 11823382702656:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:ssl/record/ssl3_record.c:299: client: SSL_connect -1 server: SSL_accept -1 ==== run-version-client-openssl-TLS1_2-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_2-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_2-server-libressl-TLS1_1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_2-server-libressl-TLS1_1.out` 15830623674080:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:365: client: SSL_connect -1 3791380908608:error:1403742E:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert protocol version:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 70 server: SSL_accept 0 ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_1.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_1.out` 0:error:1425F102:SSL routines:ssl_choose_client_version:unsupported protocol:ssl/statem/statem_lib.c:1947: client: SSL_connect -1 1453226465856:error:1403710B:SSL routines:ACCEPT_SR_KEY_EXCH:wrong version number:/usr/src/lib/libssl/ssl_pkt.c:373: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-openssl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-openssl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out` grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out; } grep -q '^success$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== check-version-client-libressl-TLS1_2-server-openssl11-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_2.out ==== run-version-client-openssl-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-openssl-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out` grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out; } grep -q '^success$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== check-version-client-openssl11-TLS1_2-server-libressl-TLS1_2 ==== Protocol : TLSv1.2 Protocol : TLSv1.2 grep -q ' Protocol *: TLSv1.2$' client-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out grep -q ' Protocol *: TLSv1.2$' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_2.out ==== run-version-client-libressl-TLS1_2-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_2-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-libressl-TLS1_3.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-libressl-TLS1_3.out` 993666288192:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 6546537183808:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-libressl-TLS1_2-server-openssl11-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_2-server-openssl11-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_2-server-openssl11-TLS1_3.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_2-server-openssl11-TLS1_3.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 4367485557312:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1_2-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_2-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_2-server-libressl-TLS1_3.out -V TLS1_2 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_2-server-libressl-TLS1_3.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 14421761239616:error:1402610B:SSL routines:ACCEPT_SR_CLNT_HELLO:wrong version number:/usr/src/lib/libssl/ssl_srvr.c:856: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_3-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_3-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-libressl-any.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-libressl-any.out` grep -q '^success$' server-version-client-libressl-TLS1_3-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_3-server-libressl-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_3-server-libressl-any.out ==== check-version-client-libressl-TLS1_3-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-TLS1_3-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-TLS1_3-server-libressl-any.out ==== run-version-client-libressl-TLS1_3-server-openssl11-any ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_3-server-openssl11-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-openssl11-any.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-openssl11-any.out` grep -q '^success$' server-version-client-libressl-TLS1_3-server-openssl11-any.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_3-server-openssl11-any.out; } grep -q '^success$' client-version-client-libressl-TLS1_3-server-openssl11-any.out ==== check-version-client-libressl-TLS1_3-server-openssl11-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-TLS1_3-server-openssl11-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-TLS1_3-server-openssl11-any.out ==== run-version-client-openssl11-TLS1_3-server-libressl-any ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_3-server-libressl-any.out -c 127.0.0.1.crt -k 127.0.0.1.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_3-server-libressl-any.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_3-server-libressl-any.out` grep -q '^success$' server-version-client-openssl11-TLS1_3-server-libressl-any.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_3-server-libressl-any.out; } grep -q '^success$' client-version-client-openssl11-TLS1_3-server-libressl-any.out ==== check-version-client-openssl11-TLS1_3-server-libressl-any ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-TLS1_3-server-libressl-any.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-TLS1_3-server-libressl-any.out ==== run-version-client-libressl-TLS1_3-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_3-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-libressl-TLS1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-libressl-TLS1.out` 839880616512:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: SSL_accept -1 3318890805824:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: SSL_connect -1 ==== run-version-client-libressl-TLS1_3-server-openssl11-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_3-server-openssl11-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-openssl11-TLS1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-openssl11-TLS1.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 5339293305408:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1_3-server-libressl-TLS1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_3-server-libressl-TLS1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_3-server-libressl-TLS1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_3-server-libressl-TLS1.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 3431266556480:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_3-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_3-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-libressl-TLS1_1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-libressl-TLS1_1.out` 4119766026816:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: SSL_accept -1 5739434277440:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:150: client: SSL_connect -1 ==== run-version-client-libressl-TLS1_3-server-openssl11-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_3-server-openssl11-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-openssl11-TLS1_1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_1.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: SSL_accept -1 11999423507008:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1_3-server-libressl-TLS1_1 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_3-server-libressl-TLS1_1.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_1 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_3-server-libressl-TLS1_1.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_1.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 17404327946816:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_3-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_3-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-libressl-TLS1_2.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-libressl-TLS1_2.out` 5059214400064:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: 5412821318208:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 SSL_accept -1 client: SSL_connect -1 ==== run-version-client-libressl-TLS1_3-server-openssl11-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_3-server-openssl11-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-openssl11-TLS1_2.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_2.out` 0:error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol:ssl/statem/statem_srvr.c:1686: server: 5668469992000:error:1404B42E:SSL routines:ST_CONNECT:tlsv1 alert protocol version:/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 70 SSL_accept -1 client: SSL_connect -1 ==== run-version-client-openssl11-TLS1_3-server-libressl-TLS1_2 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_3-server-libressl-TLS1_2.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_2 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_3-server-libressl-TLS1_2.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_2.out` 0:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:ssl/record/rec_layer_s3.c:1544:SSL alert number 70 client: SSL_connect -1 16476845021760:error:140260E3:SSL routines:ACCEPT_SR_CLNT_HELLO:parse tlsext:/usr/src/lib/libssl/ssl_srvr.c:1025: server: SSL_accept -1 ==== run-version-client-libressl-TLS1_3-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out` grep -q '^success$' server-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out; } grep -q '^success$' client-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out ==== check-version-client-libressl-TLS1_3-server-libressl-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-TLS1_3-server-libressl-TLS1_3.out ==== run-version-client-libressl-TLS1_3-server-openssl11-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out` grep -q '^success$' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out; } grep -q '^success$' client-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out ==== check-version-client-libressl-TLS1_3-server-openssl11-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-libressl-TLS1_3-server-openssl11-TLS1_3.out ==== run-version-client-openssl11-TLS1_3-server-libressl-TLS1_3 ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out -c 127.0.0.1.crt -k 127.0.0.1.key -V TLS1_3 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out -V TLS1_3 `sed -n 's/listen sock: //p' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out` grep -q '^success$' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out || { sleep 1; grep -q '^success$' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out; } grep -q '^success$' client-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out ==== check-version-client-openssl11-TLS1_3-server-libressl-TLS1_3 ==== Protocol : TLSv1.3 Protocol : TLSv1.3 grep -q ' Protocol *: TLSv1.3$' client-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out grep -q ' Protocol *: TLSv1.3$' server-version-client-openssl11-TLS1_3-server-libressl-TLS1_3.out ===> cipher LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client -l ALL -L >client-libressl.ciphers.tmp sed -n 's/^cipher //p' client-libressl.ciphers rm client-libressl.ciphers.tmp openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ..............................................+++++ ......+++++ writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key ......................+++++ .....................................................+++++ writing new private key to 'ca.key' ----- openssl dsaparam -genkey -out dsa.key 2048 Generating DSA parameters, 2048 bit long prime This could take some time ..........+....+........+....+.+.+.+...+................+..+....+....+.+.....+.........+..................+.......+...............+++++++++++++++++++++++++++++++++++++++++++++++++++* .....+.....................+...............................................+........+.......+.........................+...+..+.....+...+............+.....+...............................................................+.............+.........+...........................+.+.....+.......+.+....+.+.+.......+.+.....+...........+++++++++++++++++++++++++++++++++++++++++++++++++++* openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost/ -nodes -key dsa.key -out dsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in dsa.req -out dsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=dsa/CN=localhost Getting CA Private Key openssl ecparam -genkey -name secp256r1 -out ec.key using curve name prime256v1 instead of secp256r1 openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ec/CN=localhost/ -nodes -key ec.key -out ec.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in ec.req -out ec.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=ec/CN=localhost Getting CA Private Key openssl genrsa -out rsa.key 2048 Generating RSA private key, 2048 bit long modulus ........................................................+++++ .................+++++ e is 65537 (0x10001) openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost/ -nodes -key rsa.key -out rsa.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in rsa.req -out rsa.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=rsa/CN=localhost Getting CA Private Key LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server -l ALL -L >server-libressl.ciphers.tmp sed -n 's/^cipher //p' server-libressl.ciphers rm server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-libressl.ciphers client-libressl.ciphers >client-libressl-server-libressl.ciphers.tmp uniq -d client-libressl-server-libressl.ciphers rm client-libressl-server-libressl.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server -l ALL -L >server-openssl.ciphers.tmp sed -n 's/^cipher //p' server-openssl.ciphers rm server-openssl.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl.ciphers >client-libressl-server-openssl.ciphers.tmp uniq -d client-libressl-server-openssl.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl.ciphers client-libressl.ciphers >client-libressl-server-openssl.ciphers.tmp uniq -d client-libressl-server-openssl.ciphers rm client-libressl-server-openssl.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server -l ALL -L >server-openssl11.ciphers.tmp sed -n 's/^cipher //p' server-openssl11.ciphers rm server-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-libressl.ciphers server-openssl11.ciphers >client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-libressl-server-openssl11.ciphers client-libressl.ciphers >client-libressl-server-openssl11.ciphers.tmp uniq -d client-libressl-server-openssl11.ciphers rm client-libressl-server-openssl11.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client -l ALL -L >client-openssl.ciphers.tmp sed -n 's/^cipher //p' client-openssl.ciphers rm client-openssl.ciphers.tmp # get ciphers shared between client and server sort client-openssl.ciphers server-libressl.ciphers >client-openssl-server-libressl.ciphers.tmp uniq -d client-openssl-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl-server-libressl.ciphers client-libressl.ciphers >client-openssl-server-libressl.ciphers.tmp uniq -d client-openssl-server-libressl.ciphers rm client-openssl-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl.ciphers server-openssl.ciphers >client-openssl-server-openssl.ciphers.tmp uniq -d client-openssl-server-openssl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl-server-openssl.ciphers client-libressl.ciphers >client-openssl-server-openssl.ciphers.tmp uniq -d client-openssl-server-openssl.ciphers rm client-openssl-server-openssl.ciphers.tmp # get ciphers shared between client and server sort client-openssl.ciphers server-openssl11.ciphers >client-openssl-server-openssl11.ciphers.tmp uniq -d client-openssl-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl-server-openssl11.ciphers client-libressl.ciphers >client-openssl-server-openssl11.ciphers.tmp uniq -d client-openssl-server-openssl11.ciphers rm client-openssl-server-openssl11.ciphers.tmp LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client -l ALL -L >client-openssl11.ciphers.tmp sed -n 's/^cipher //p' client-openssl11.ciphers rm client-openssl11.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-libressl.ciphers client-libressl.ciphers >client-openssl11-server-libressl.ciphers.tmp uniq -d client-openssl11-server-libressl.ciphers rm client-openssl11-server-libressl.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl.ciphers >client-openssl11-server-openssl.ciphers.tmp uniq -d client-openssl11-server-openssl.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl.ciphers client-libressl.ciphers >client-openssl11-server-openssl.ciphers.tmp uniq -d client-openssl11-server-openssl.ciphers rm client-openssl11-server-openssl.ciphers.tmp # get ciphers shared between client and server sort client-openssl11.ciphers server-openssl11.ciphers >client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers # we are only interested in ciphers supported by libressl sort client-openssl11-server-openssl11.ciphers client-libressl.ciphers >client-openssl11-server-openssl11.ciphers.tmp uniq -d client-openssl11-server-openssl11.ciphers rm client-openssl11-server-openssl11.ciphers.tmp rm -f ciphers.mk ciphers.mk.tmp echo 'CIPHERS_libressl_libressl =' >>ciphers.mk.tmp `cat client-libressl-server-libressl.ciphers` echo 'CIPHERS_libressl_openssl =' >>ciphers.mk.tmp `cat client-libressl-server-openssl.ciphers` echo 'CIPHERS_libressl_openssl11 =' >>ciphers.mk.tmp `cat client-libressl-server-openssl11.ciphers` echo 'CIPHERS_openssl_libressl =' >>ciphers.mk.tmp `cat client-openssl-server-libressl.ciphers` echo 'CIPHERS_openssl_openssl =' >>ciphers.mk.tmp `cat client-openssl-server-openssl.ciphers` echo 'CIPHERS_openssl_openssl11 =' >>ciphers.mk.tmp `cat client-openssl-server-openssl11.ciphers` echo 'CIPHERS_openssl11_libressl =' >>ciphers.mk.tmp `cat client-openssl11-server-libressl.ciphers` echo 'CIPHERS_openssl11_openssl =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl.ciphers` echo 'CIPHERS_openssl11_openssl11 =' >>ciphers.mk.tmp `cat client-openssl11-server-openssl11.ciphers` mv ciphers.mk.tmp ciphers.mk ==== run-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl ==== openssl dhparam -out dh.param 1024 Generating DH parameters, 1024 bit long safe prime, generator 2 This is going to take a long time .......................................................................+..................................+...........+........+.....................................................................+......................................+.......+.................................+.....................................+..................................+.........+................+...........................................+..................+.....................+.................................................................................................................................+........+.................+..............................................................................................................+.+..............................................................................................................+.....................................+......+.+......+...................................................................................................................................................+......................+...+....+.............................................................................+.........+................................+........................+.................................................................................+.......................+...........................................+.....................................................................+.........................................................................................+.......................................................................+..............................................................................................................................................................................................................................+.........+.....++*++*++*++*++* LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ADH-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ADH-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out -l ADH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ADH-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out -l ADH-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ADH-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ADH-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ADH-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out -l ADH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ADH-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out -l ADH-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-ADH-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out -l ADH-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l ADH-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out -l ADH-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l ADH-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out -l ADH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-RC4-MD5-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-RC4-MD5 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out -l ADH-RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out ==== check-cipher-ADH-RC4-MD5-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ADH-RC4-MD5-client-libressl-server-libressl.out ==== run-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AEAD-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out -l AEAD-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: AEAD-AES128-GCM-SHA256$' client-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: AEAD-AES128-GCM-SHA256$' server-cipher-AEAD-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AEAD-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out -l AEAD-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl ==== grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' client-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AEAD-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AEAD-CHACHA20-POLY1305-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out -l AEAD-CHACHA20-POLY1305-SHA256 `sed -n 's/listen sock: //p' server-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out ==== check-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl ==== grep -q ' Cipher *: AEAD-CHACHA20-POLY1305-SHA256$' client-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out grep -q ' Cipher *: AEAD-CHACHA20-POLY1305-SHA256$' server-cipher-AEAD-CHACHA20-POLY1305-SHA256-client-libressl-server-libressl.out ==== run-cipher-AECDH-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out -l AECDH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-AECDH-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AECDH-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-AECDH-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out -l AECDH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-AECDH-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AECDH-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out -l AECDH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-AECDH-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out -l AECDH-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-AECDH-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AECDH-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-libressl.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-libressl.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-libressl.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-libressl.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out -l DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-ECDSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out -l ECDHE-RSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -c rsa.crt -k rsa.key -l EDH-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out -l EDH-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-libressl.out ==== run-cipher-GOST2001-GOST89-GOST89-client-libressl-server-libressl ==== openssl genpkey -algorithm gost2001 -pkeyopt paramset:A -pkeyopt dgst:md_gost94 -out gost.key openssl req -batch -new -md_gost94 -subj /L=OpenBSD/O=tls-regress/OU=gost/CN=localhost/ -nodes -key gost.key -out gost.req openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in gost.req -out gost.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=gost/CN=localhost Getting CA Private Key # gost does not work with libressl TLS 1.3 right now DISABLED ==== check-cipher-GOST2001-GOST89-GOST89-client-libressl-server-libressl ==== # gost does not work with libressl TLS 1.3 right now DISABLED # gost does not work with libressl TLS 1.3 right now DISABLED # gost does not work with libressl TLS 1.3 right now DISABLED ==== run-cipher-GOST2012256-GOST89-GOST89-client-libressl-server-libressl ==== # gost does not work with libressl TLS 1.3 right now DISABLED ==== check-cipher-GOST2012256-GOST89-GOST89-client-libressl-server-libressl ==== # gost does not work with libressl TLS 1.3 right now DISABLED # gost does not work with libressl TLS 1.3 right now DISABLED # gost does not work with libressl TLS 1.3 right now DISABLED ==== run-cipher-RC4-MD5-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-MD5-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-MD5 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-MD5-client-libressl-server-libressl.out -l RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-RC4-MD5-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-RC4-MD5-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-MD5-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-MD5-client-libressl-server-libressl.out ==== check-cipher-RC4-MD5-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-RC4-MD5-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-RC4-MD5-client-libressl-server-libressl.out ==== run-cipher-RC4-SHA-client-libressl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-SHA-client-libressl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-SHA-client-libressl-server-libressl.out -l RC4-SHA `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-libressl-server-libressl.out` grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-SHA-client-libressl-server-libressl.out ==== check-cipher-RC4-SHA-client-libressl-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-RC4-SHA-client-libressl-server-libressl.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' server-cipher-RC4-SHA-client-libressl-server-libressl.out ==== run-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-GCM-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out -l ADH-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== check-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES128-GCM-SHA256$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES128-GCM-SHA256$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== run-cipher-ADH-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out -l ADH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-ADH-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES128-SHA$' client-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES128-SHA$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-AES128-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out -l ADH-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out ==== check-cipher-ADH-AES128-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES128-SHA256$' client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES128-SHA256$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl.out ==== run-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-GCM-SHA384 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out -l ADH-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== check-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES256-GCM-SHA384$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES256-GCM-SHA384$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== run-cipher-ADH-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out -l ADH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-ADH-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES256-SHA$' client-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES256-SHA$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-AES256-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out -l ADH-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out ==== check-cipher-ADH-AES256-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-AES256-SHA256$' client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-AES256-SHA256$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl.out ==== run-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out -l ADH-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== check-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-CAMELLIA128-SHA$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-CAMELLIA128-SHA$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out -l ADH-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== check-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-CAMELLIA256-SHA$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-CAMELLIA256-SHA$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-DES-CBC3-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out -l ADH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-DES-CBC3-SHA$' client-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-DES-CBC3-SHA$' server-cipher-ADH-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-RC4-MD5-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-RC4-MD5 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out -l ADH-RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out ==== check-cipher-ADH-RC4-MD5-client-libressl-server-openssl ==== grep -q ' Cipher *: ADH-RC4-MD5$' client-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out grep -q ' Cipher *: ADH-RC4-MD5$' server-cipher-ADH-RC4-MD5-client-libressl-server-openssl.out ==== run-cipher-AECDH-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out -l AECDH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-AECDH-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AECDH-AES128-SHA$' client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AECDH-AES128-SHA$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-AECDH-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out -l AECDH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-AECDH-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AECDH-AES256-SHA$' client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AECDH-AES256-SHA$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out -l AECDH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AECDH-DES-CBC3-SHA$' client-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AECDH-DES-CBC3-SHA$' server-cipher-AECDH-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-AECDH-RC4-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out -l AECDH-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out ==== check-cipher-AECDH-RC4-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AECDH-RC4-SHA$' client-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AECDH-RC4-SHA$' server-cipher-AECDH-RC4-SHA-client-libressl-server-openssl.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: AES128-GCM-SHA256$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: AES128-GCM-SHA256$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES128-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AES128-SHA$' client-cipher-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AES128-SHA$' server-cipher-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES128-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: AES128-SHA256$' client-cipher-AES128-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: AES128-SHA256$' server-cipher-AES128-SHA256-client-libressl-server-openssl.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: AES256-GCM-SHA384$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: AES256-GCM-SHA384$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES256-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: AES256-SHA$' client-cipher-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: AES256-SHA$' server-cipher-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-AES256-SHA256-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: AES256-SHA256$' client-cipher-AES256-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: AES256-SHA256$' server-cipher-AES256-SHA256-client-libressl-server-openssl.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: CAMELLIA128-SHA$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: CAMELLIA128-SHA$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: CAMELLIA256-SHA$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: CAMELLIA256-SHA$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== run-cipher-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out -l DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: DES-CBC3-SHA$' client-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: DES-CBC3-SHA$' server-cipher-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES128-GCM-SHA256$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES128-GCM-SHA256$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES128-SHA$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES128-SHA$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES128-SHA256$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES128-SHA256$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES256-GCM-SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES256-SHA$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES256-SHA$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-AES256-SHA256$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-AES256-SHA256$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-CAMELLIA128-SHA$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-CAMELLIA128-SHA$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: DHE-RSA-CAMELLIA256-SHA$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: DHE-RSA-CAMELLIA256-SHA$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-GCM-SHA256$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-GCM-SHA256$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA256$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA256$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-GCM-SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out -l ECDHE-ECDSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-DES-CBC3-SHA$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-DES-CBC3-SHA$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out -l ECDHE-ECDSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-ECDSA-RC4-SHA$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-ECDSA-RC4-SHA$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-GCM-SHA256$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES128-GCM-SHA256$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-SHA$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES128-SHA$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-SHA256$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES128-SHA256$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-GCM-SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-SHA$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES256-SHA$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-AES256-SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out -l ECDHE-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-DES-CBC3-SHA$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-DES-CBC3-SHA$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out -l ECDHE-RSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out ==== check-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: ECDHE-RSA-RC4-SHA$' client-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: ECDHE-RSA-RC4-SHA$' server-cipher-ECDHE-RSA-RC4-SHA-client-libressl-server-openssl.out ==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out -c rsa.crt -k rsa.key -l EDH-RSA-DES-CBC3-SHA -p dh.param 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out -l EDH-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: EDH-RSA-DES-CBC3-SHA$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: EDH-RSA-DES-CBC3-SHA$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-libressl-server-openssl.out ==== run-cipher-RC4-MD5-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-RC4-MD5-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-MD5 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-MD5-client-libressl-server-openssl.out -l RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-RC4-MD5-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-RC4-MD5-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-MD5-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-RC4-MD5-client-libressl-server-openssl.out ==== check-cipher-RC4-MD5-client-libressl-server-openssl ==== grep -q ' Cipher *: RC4-MD5$' client-cipher-RC4-MD5-client-libressl-server-openssl.out grep -q ' Cipher *: RC4-MD5$' server-cipher-RC4-MD5-client-libressl-server-openssl.out ==== run-cipher-RC4-SHA-client-libressl-server-openssl ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cipher-RC4-SHA-client-libressl-server-openssl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-RC4-SHA-client-libressl-server-openssl.out -l RC4-SHA `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-libressl-server-openssl.out` grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-openssl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-libressl-server-openssl.out; } grep -q '^success$' client-cipher-RC4-SHA-client-libressl-server-openssl.out ==== check-cipher-RC4-SHA-client-libressl-server-openssl ==== grep -q ' Cipher *: RC4-SHA$' client-cipher-RC4-SHA-client-libressl-server-openssl.out grep -q ' Cipher *: RC4-SHA$' server-cipher-RC4-SHA-client-libressl-server-openssl.out ==== run-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ADH-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out -l ADH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out -l ADH-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ADH-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out -l ADH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out -l ADH-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l ADH-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l ADH-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l ADH-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l ADH-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ADH-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out -l AECDH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AECDH-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out -l AECDH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AECDH-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA-client-libressl-server-openssl11.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES128-SHA256-client-libressl-server-openssl11.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA-client-libressl-server-openssl11.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-AES256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-AES256-SHA256-client-libressl-server-openssl11.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-AES256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out -l DHE-RSA-CAMELLIA256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-libressl-server-openssl11.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l DHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-ECDSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES128-SHA256-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-AES256-SHA384-client-libressl-server-openssl11.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out -l ECDHE-RSA-CHACHA20-POLY1305 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11 ==== # client and server 1.3 capable, not TLS 1.3 cipher # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: AEAD-(AES256-GCM-SHA384|CHACHA20-POLY1305-SHA256)$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out # libressl client may prefer chacha-poly if aes-ni is not supported egrep -q ' Cipher *: TLS_(AES_256_GCM_SHA384|CHACHA20_POLY1305_SHA256)$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-libressl-server-openssl11.out ==== run-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out -l ADH-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== check-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES128-GCM-SHA256$' client-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES128-GCM-SHA256$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== run-cipher-ADH-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out -l ADH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-ADH-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES128-SHA$' client-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES128-SHA$' server-cipher-ADH-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-AES128-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out -l ADH-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out ==== check-cipher-ADH-AES128-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES128-SHA256$' client-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES128-SHA256$' server-cipher-ADH-AES128-SHA256-client-openssl-server-libressl.out ==== run-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out -l ADH-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== check-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES256-GCM-SHA384$' client-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES256-GCM-SHA384$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== run-cipher-ADH-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out -l ADH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-ADH-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES256-SHA$' client-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES256-SHA$' server-cipher-ADH-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-AES256-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out -l ADH-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out ==== check-cipher-ADH-AES256-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-AES256-SHA256$' client-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-AES256-SHA256$' server-cipher-ADH-AES256-SHA256-client-openssl-server-libressl.out ==== run-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out -l ADH-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== check-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-CAMELLIA128-SHA$' client-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-CAMELLIA128-SHA$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out -l ADH-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== check-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-CAMELLIA256-SHA$' client-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-CAMELLIA256-SHA$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out -l ADH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-DES-CBC3-SHA$' client-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-DES-CBC3-SHA$' server-cipher-ADH-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-RC4-MD5-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-RC4-MD5 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out -l ADH-RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out ==== check-cipher-ADH-RC4-MD5-client-openssl-server-libressl ==== grep -q ' Cipher *: ADH-RC4-MD5$' client-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out grep -q ' Cipher *: ADH-RC4-MD5$' server-cipher-ADH-RC4-MD5-client-openssl-server-libressl.out ==== run-cipher-AECDH-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out -l AECDH-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-AECDH-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AECDH-AES128-SHA$' client-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AECDH-AES128-SHA$' server-cipher-AECDH-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-AECDH-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out -l AECDH-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-AECDH-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AECDH-AES256-SHA$' client-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AECDH-AES256-SHA$' server-cipher-AECDH-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out -l AECDH-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AECDH-DES-CBC3-SHA$' client-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AECDH-DES-CBC3-SHA$' server-cipher-AECDH-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-AECDH-RC4-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out -l AECDH-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out ==== check-cipher-AECDH-RC4-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AECDH-RC4-SHA$' client-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AECDH-RC4-SHA$' server-cipher-AECDH-RC4-SHA-client-openssl-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out -l AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: AES128-GCM-SHA256$' client-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: AES128-GCM-SHA256$' server-cipher-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES128-SHA-client-openssl-server-libressl.out -l AES128-SHA `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AES128-SHA$' client-cipher-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AES128-SHA$' server-cipher-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES128-SHA256-client-openssl-server-libressl.out -l AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: AES128-SHA256$' client-cipher-AES128-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: AES128-SHA256$' server-cipher-AES128-SHA256-client-openssl-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out -l AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: AES256-GCM-SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: AES256-GCM-SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES256-SHA-client-openssl-server-libressl.out -l AES256-SHA `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: AES256-SHA$' client-cipher-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: AES256-SHA$' server-cipher-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-AES256-SHA256-client-openssl-server-libressl.out -l AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: AES256-SHA256$' client-cipher-AES256-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: AES256-SHA256$' server-cipher-AES256-SHA256-client-openssl-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out -l CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: CAMELLIA128-SHA$' client-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: CAMELLIA128-SHA$' server-cipher-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out -l CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: CAMELLIA256-SHA$' client-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: CAMELLIA256-SHA$' server-cipher-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== run-cipher-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out -l DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: DES-CBC3-SHA$' client-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: DES-CBC3-SHA$' server-cipher-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES128-GCM-SHA256$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES128-GCM-SHA256$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out -l DHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES128-SHA$' client-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES128-SHA$' server-cipher-DHE-RSA-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out -l DHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES128-SHA256$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES128-SHA256$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES256-GCM-SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out -l DHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES256-SHA$' client-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES256-SHA$' server-cipher-DHE-RSA-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out -l DHE-RSA-AES256-SHA256 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-AES256-SHA256$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-AES256-SHA256$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-CAMELLIA128-SHA$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-CAMELLIA128-SHA$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: DHE-RSA-CAMELLIA256-SHA$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: DHE-RSA-CAMELLIA256-SHA$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-GCM-SHA256$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-GCM-SHA256$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA256$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES128-SHA256$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-GCM-SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-AES256-SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out -l ECDHE-ECDSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-DES-CBC3-SHA$' client-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-DES-CBC3-SHA$' server-cipher-ECDHE-ECDSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out -l ECDHE-ECDSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-ECDSA-RC4-SHA$' client-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-ECDSA-RC4-SHA$' server-cipher-ECDHE-ECDSA-RC4-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-GCM-SHA256$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES128-GCM-SHA256$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out -l ECDHE-RSA-AES128-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-SHA$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES128-SHA$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out -l ECDHE-RSA-AES128-SHA256 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES128-SHA256$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES128-SHA256$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-GCM-SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out -l ECDHE-RSA-AES256-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-SHA$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES256-SHA$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out -l ECDHE-RSA-AES256-SHA384 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-AES256-SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-AES256-SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out -l ECDHE-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-DES-CBC3-SHA$' client-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-DES-CBC3-SHA$' server-cipher-ECDHE-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out -l ECDHE-RSA-RC4-SHA `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out ==== check-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: ECDHE-RSA-RC4-SHA$' client-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: ECDHE-RSA-RC4-SHA$' server-cipher-ECDHE-RSA-RC4-SHA-client-openssl-server-libressl.out ==== run-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out -c rsa.crt -k rsa.key -l EDH-RSA-DES-CBC3-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out -l EDH-RSA-DES-CBC3-SHA `sed -n 's/listen sock: //p' server-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== check-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: EDH-RSA-DES-CBC3-SHA$' client-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: EDH-RSA-DES-CBC3-SHA$' server-cipher-EDH-RSA-DES-CBC3-SHA-client-openssl-server-libressl.out ==== run-cipher-RC4-MD5-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-MD5-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-MD5 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-RC4-MD5-client-openssl-server-libressl.out -l RC4-MD5 `sed -n 's/listen sock: //p' server-cipher-RC4-MD5-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-RC4-MD5-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-MD5-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-MD5-client-openssl-server-libressl.out ==== check-cipher-RC4-MD5-client-openssl-server-libressl ==== grep -q ' Cipher *: RC4-MD5$' client-cipher-RC4-MD5-client-openssl-server-libressl.out grep -q ' Cipher *: RC4-MD5$' server-cipher-RC4-MD5-client-openssl-server-libressl.out ==== run-cipher-RC4-SHA-client-openssl-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-RC4-SHA-client-openssl-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l RC4-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cipher-RC4-SHA-client-openssl-server-libressl.out -l RC4-SHA `sed -n 's/listen sock: //p' server-cipher-RC4-SHA-client-openssl-server-libressl.out` grep -q '^success$' server-cipher-RC4-SHA-client-openssl-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-RC4-SHA-client-openssl-server-libressl.out; } grep -q '^success$' client-cipher-RC4-SHA-client-openssl-server-libressl.out ==== check-cipher-RC4-SHA-client-openssl-server-libressl ==== grep -q ' Cipher *: RC4-SHA$' client-cipher-RC4-SHA-client-openssl-server-libressl.out grep -q ' Cipher *: RC4-SHA$' server-cipher-RC4-SHA-client-openssl-server-libressl.out ==== run-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ADH-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ADH-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out -l ADH-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out -l ADH-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ADH-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ADH-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out -l ADH-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out -l ADH-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l ADH-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l ADH-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l ADH-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l ADH-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l ADH-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ADH-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out -l AECDH-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AECDH-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AECDH-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out -l AECDH-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AECDH-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA-client-openssl11-server-libressl.out -l AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES128-SHA256-client-openssl11-server-libressl.out -l AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA-client-openssl11-server-libressl.out -l AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-AES256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-AES256-SHA256-client-openssl11-server-libressl.out -l AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-AES256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c 127.0.0.1.crt -k 127.0.0.1.key -l CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l DHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-AES256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-AES256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-AES256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-CAMELLIA128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CAMELLIA256-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out -l DHE-RSA-CAMELLIA256-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-CAMELLIA256-SHA256-client-openssl11-server-libressl.out ==== run-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l DHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l DHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-DHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-ECDSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c ec.crt -k ec.key -l ECDHE-ECDSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-ECDSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-ECDSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-GCM-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-GCM-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES128-GCM-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES128-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES128-SHA256 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out -l ECDHE-RSA-AES128-SHA256,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES128-SHA256-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-GCM-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-GCM-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES256-GCM-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES256-SHA-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-AES256-SHA384 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out -l ECDHE-RSA-AES256-SHA384,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-AES256-SHA384-client-openssl11-server-libressl.out ==== run-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -c rsa.crt -k rsa.key -l ECDHE-RSA-CHACHA20-POLY1305 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out -l ECDHE-RSA-CHACHA20-POLY1305,@SECLEVEL=0 `sed -n 's/listen sock: //p' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out` grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out || { sleep 1; grep -q '^success$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out; } grep -q '^success$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ==== check-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl ==== # client and server 1.3 capable, not TLS 1.3 cipher # openssl 1.1 generic client cipher grep -q ' Cipher *: TLS_AES_256_GCM_SHA384$' client-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out # libressl generic server cipher grep -q ' Cipher *: AEAD-AES256-GCM-SHA384$' server-cipher-ECDHE-RSA-CHACHA20-POLY1305-client-openssl11-server-libressl.out ===> cert ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=127.0.0.1/ -nodes -newkey rsa -keyout 127.0.0.1.key -x509 -out 127.0.0.1.crt Generating a 2048 bit RSA private key ......................................................................................................................................+++++ ...............................................................+++++ writing new private key to '127.0.0.1.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout ca.key -x509 -out ca.crt Generating a 2048 bit RSA private key .....................+++++ .....+++++ writing new private key to 'ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=ca/CN=root/ -nodes -newkey rsa -keyout fake-ca.key -x509 -out fake-ca.crt Generating a 2048 bit RSA private key .............................+++++ ....................................................................................+++++ writing new private key to 'fake-ca.key' ----- openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=client/CN=localhost/ -nodes -newkey rsa -keyout client.key -out client.req Generating a 2048 bit RSA private key .....................................................................+++++ ................................................+++++ writing new private key to 'client.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in client.req -out client.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=client/CN=localhost Getting CA Private Key openssl req -batch -new -subj /L=OpenBSD/O=tls-regress/OU=server/CN=localhost/ -nodes -newkey rsa -keyout server.key -out server.req Generating a 2048 bit RSA private key .......................................+++++ .........+++++ writing new private key to 'server.key' ----- openssl x509 -CAcreateserial -CAkey ca.key -CA ca.crt -req -in server.req -out server.crt Signature ok subject=/L=OpenBSD/O=tls-regress/OU=server/CN=localhost Getting CA Private Key LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 7973255825984:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 7973255825984:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 6623587134016:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-nocert-certverify.out` 2496453264928:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: 15531725363776:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 SSL_accept -1 client: SSL_connect 0 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 12680432253504:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 5140222662112:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 2316667218496:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 11183018154560:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 11183018154560:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 6533587757632:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6533587757632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out` 8649275573536:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12579015424576:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 6651349948992:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 6651349948992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: server: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 17375841291808:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10917415004736:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 11492164246080:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11492164246080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out` 1541693097248:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12423821048384:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out` 12871932922432:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 12871932922432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 14396951085984:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14455331170880:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 13144621759040:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13144621759040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out` 15247826941344:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 4687830338112:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 17173118917184:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 17173118917184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 1893373351840:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 3686019586624:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 7426050955840:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 7426050955840:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 16268118481472:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-noca-cert-certverify.out` 24716883808:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: 9745855638080:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 6301970184768:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 4577270579360:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 12524515629632:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-noca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 4844220557888:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 4844220557888:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 2926033136192:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2926033136192:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out` 8365692850272:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 11826156804672:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out` 4415581284928:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 4415581284928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 8749333197664:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 5451502393920:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out` 2194712025664:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2194712025664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out` 11330965842720:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 9895333411392:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out` 13320567908928:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13320567908928:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out` 9119259200160:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 12873352571456:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 2184554289728:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2184554289728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-noca-cert-certverify.out` 2144604288992:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 16089036839488:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-noca-cert-certverify.out` 4238983494208:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 4238983494208:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 14544672372512:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14998067612224:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 8521872812608:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 8521872812608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out` 11932740586048:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 2546490544480:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: client: SSL_connect 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 11113257090912:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 594794109504:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 11360682199616:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11360682199616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 6926587611712:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6926587611712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out` 15713370577472:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 5316322384992:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: client: SSL_connect 0server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 4036323918880:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 10634349144640:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 9881665944128:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9881665944128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 5543902751296:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 5543902751296:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out` 17440869610720:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: 7392588950080:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: SSL_accept 0 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out` 234609211968:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 234609211968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 5344769858784:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 8593402632768:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out` 16108772772416:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16108772772416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out` 875888142048:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 10081525176896:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out` 11081617459776:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11081617459776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out` 4836991884576:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10371362507328:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 214698756672:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 214698756672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out` 10680281389664:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 508552542784:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out` 13174049241664:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13174049241664:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 16856436455328:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 11919875332672:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out` 4169556302400:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 4169556302400:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out` 15984752945728:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 14989575030496:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: client: server: SSL_accept -1 SSL_connect 0 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out` 5179695928352:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 2365215234624:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 13619646171712:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13619646171712:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 11986624956992:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11986624956992:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out` 15889900563008:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: 10886281645856:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: SSL_connect 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 13053694872096:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 3009356253760:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 14188733811264:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 14188733811264:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out` 10976773802560:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 10976773802560:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out` 7541593999584:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 6099371530816:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out` 11249997978176:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11249997978176:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out` 11755751463584:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 8168588925504:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out` 9316896393792:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9316896393792:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out` 1179860203680:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 8334566853184:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out` 3312028645952:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 3312028645952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out` 226972946848:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 5351070530112:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out` 16372276963904:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16372276963904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out` 12741887907232:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 17371848440384:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out` 13975437208128:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13975437208128:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out` 13879273575904:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 503988312640:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 9036190333504:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 9036190333504:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 8973762669120:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-nocert-certverify.out` 4290501170016:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: 4119827302976:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 SSL_accept -1 client: SSL_connect 0 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 9436796013120:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 9596458602272:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 17126377671232:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 14185995582016:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 14185995582016:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 11286361205312:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11286361205312:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out` 15230078136800:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 5744926587456:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 11368084662848:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11368084662848:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: server: SSL_connect -1SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 12864038339808:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 5932734257728:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 7523777899072:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 7523777899072:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out` 273442842656:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: 16629038664256:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: SSL_accept 0 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out` 14065511041600:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 14065511041600:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 11984544661280:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10157855877696:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 17135969221184:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 17135969221184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out` 10830967538080:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 11976251050560:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 17538221984320:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 17538221984320:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 12071971546912:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 2781121096256:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 7566071618112:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 7566071618112:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 2268003154496:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-ca-cert-certverify.out` 3297557941216:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: SSL_accept -1 2635858889280:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 4030734674496:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 13011899888992:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 16892625095232:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-ca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: 6045095864896:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: SSL_read 0 6045095864896:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 3527148812864:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 3527148812864:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out` 14728485820704:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 15834554485312:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out` 8565042915904:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 8565042915904:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 17168504638944:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 6624992008768:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out` 3687060695616:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 3687060695616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out` 4418816922336:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 3031089830464:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out` 9077205412416:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9077205412416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out` 3388303927264:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10679095614016:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 5160814066240:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 5160814066240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-ca-cert-certverify.out` 9221517772512:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 2720194927168:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-ca-cert-certverify.out` 13147133504064:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13147133504064:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 16894421210592:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 3746425322048:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-nocert-certverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-nocert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 10956301437504:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 10956301437504:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out` 11628837432224:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 8285909891648:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out` 17068759087680:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 17068759087680:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 2121111022752:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14887569447488:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out` 8921604295232:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 8921604295232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out` 1028323632736:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 7044334930496:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out` 959023618624:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 959023618624:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out` 15830695746208:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 13984861112896:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 2332051536448:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2332051536448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out` 7201731439648:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 10467005123136:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out` 240810035776:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 240810035776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 16574757697504:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 3987201940032:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-ca-cert-certverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-ca-cert-certverify.out success ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out` 2992769563200:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2992769563200:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out` 15350999708832:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 3588692949568:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out` 8007234746944:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 8007234746944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: server: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out` 3126890139488:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 4005105269312:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out` 735660091968:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 735660091968:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out` 7351582280992:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 5053516106304:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out` 9986457025088:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9986457025088:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out` 15146020134304:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10380728769088:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out` 9869869578816:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9869869578816:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out` 14614572934752:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 4649217006144:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out` 5969096002112:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 5969096002112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out` 915068196768:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 4506088573504:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-ca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 16738398300736:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 16738398300736:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 10929677957696:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-nocert-certverify.out` 8005322753760:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: SSL_accept -1 15954110655040:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 457306765888:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 12807383693920:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 4724039899712:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 14395345979968:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 14395345979968:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 6702620195392:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6702620195392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out` 443716762976:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 8414196652608:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out` 16498565839424:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16498565839424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 2045582416416:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14278402357824:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 8281140304448:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 8281140304448:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out` 13112335434720:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12980131867200:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out` 15585855400512:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: 15585855400512:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 1378199740448:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 11480657865280:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 7781403527744:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 7781403527744:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out` 12352421582304:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 11103304317504:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out` 6821475588672:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6821475588672:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 3437966508256:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 7619179919936:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out` grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-verify.out success ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out` grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-verify.out success ==== run-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 2234299279936:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 2234299279936:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 11048422971968:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl-fakeca-cert-certverify.out` 983159755232:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: SSL_accept -1 2114322352704:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 ==== run-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 16942939355712:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 1124217783776:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 9569842326080:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: 3984734648896:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: SSL_read 0 3984734648896:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 3420209879616:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 3420209879616:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 3420209879616:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 3420209879616:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 3420209879616:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out` 14287933604256:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 14017542740544:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 14017542740544:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 14017542740544:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 14017542740544:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out` 12025955830336:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 12025955830336:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 12025955830336:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 12025955830336:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: server: SSL_accept -1 12025955830336:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 7282256509472:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 5086831307328:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 2437716212288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 2437716212288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 2437716212288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 2437716212288:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 2437716212288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out` 12241908662496:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 13386290088512:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 13386290088512:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 13386290088512:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 13386290088512:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out` 13597571263040:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 13597571263040:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 13597571263040:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: server: SSL_accept -1 13597571263040:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 13597571263040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 11938234707104:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 6525031082560:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 15028638243392:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 15028638243392:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 15028638243392:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 15028638243392:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 15028638243392:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl-fakeca-cert-certverify.out` 16567442062752:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 6256506997312:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 6256506997312:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 6256506997312:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 6256506997312:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 ==== run-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-nocert-verify-server-openssl11-fakeca-cert-certverify.out` 5692179601984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 5692179601984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 5692179601984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 5692179601984:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: server: 5692179601984:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: SSL_accept -1client: SSL_connect -1 ==== run-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 4280040941344:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 10134940527168:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 ==== run-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-nocert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 5393713908288:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 5393713908288:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 5393713908288:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 5393713908288:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 5393713908288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out` 9565691738272:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:rsa_pk1.c:116: 9565691738272:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:693: 12111398087232:error:1402041B:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert decrypt error:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 51 client: 9565691738272:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:a_verify.c:218: SSL_connect 0 9565691738272:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:588: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 11402507200992:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 client: SSL_connect 0 9317229333056:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 9317229333056:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 9317229333056:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 9317229333056:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 client: SSL_read 0 14715020896832:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 14715020896832:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 14715020896832:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 14715020896832:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 14715020896832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 9300180154944:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 9300180154944:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 9300180154944:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 9300180154944:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 9300180154944:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out` 4859907713760:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:rsa_pk1.c:116: 4859907713760:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:693: 11240910367296:error:1402041B:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert decrypt error:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 51 client: SSL_connect 0 4859907713760:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:a_verify.c:218: 4859907713760:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:588: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 17043640349088:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 client: SSL_connect 0 8429549238848:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 8429549238848:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 8429549238848:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 8429549238848:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 client: SSL_read 0 8889833523776:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 8889833523776:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 8889833523776:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 8889833523776:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 8889833523776:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 656440261184:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 656440261184:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out` 10140373295520:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 6221128997440:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out` 9735494236736:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9735494236736:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 430149980896:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14235823237696:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -C fake-ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 4702753106496:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 4702753106496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out` 4147056162272:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12685392734784:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out` 16607739730496:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16607739730496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 7880643563232:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 15705845459520:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -C fake-ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 201786567232:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 201786567232:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out` 12757590037536:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 14063093721664:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out` 12688693008960:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 12688693008960:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 17100009642720:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 15054781925952:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -C fake-ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out` grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-noverify.out success ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-noverify.out success ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 15179975125568:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 15179975125568:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 15179975125568:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 15179975125568:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 15179975125568:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out` 17334115348704:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:rsa_pk1.c:116: 17334115348704:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:693: 2856582859328:error:1402041B:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert decrypt error:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 51 client: SSL_connect 0 17334115348704:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:a_verify.c:218: 17334115348704:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:588: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 12744490960032:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 client: SSL_connect 0 4346552683072:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 4346552683072:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 4346552683072:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 4346552683072:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 client: SSL_read 0 14214499981888:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 14214499981888:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 14214499981888:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 14214499981888:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 14214499981888:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 12168266390080:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 12168266390080:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 12168266390080:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 12168266390080:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 12168266390080:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out` 1000384411488:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:rsa_pk1.c:116: 1000384411488:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:rsa_eay.c:693: 7899185781312:error:1402041B:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert decrypt error:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 51 client: SSL_connect 0 1000384411488:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:a_verify.c:218: 1000384411488:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out` 0:error:0407008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:67: 0:error:04067072:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:588: 0:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib:crypto/asn1/a_verify.c:170: 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail server-cert-client-libressl-noca-cert-noverify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 6231905554336:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 client: SSL_connect 0 12841166174784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 12841166174784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 12841166174784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 12841166174784:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out` 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 client: SSL_read 0 1963656542784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 1963656542784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 1963656542784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 1963656542784:error:1404A41B:SSL routines:ST_ACCEPT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 1963656542784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail server-cert-client-openssl11-noca-cert-noverify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 8075765234240:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 8075765234240:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 8075765234240:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 8075765234240:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 8075765234240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out` 5180148331232:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 3366327192128:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 3366327192128:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 3366327192128:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 3366327192128:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out` 13435151456832:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 13435151456832:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 13435151456832:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: server: SSL_accept -1 13435151456832:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 13435151456832:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 6273631301600:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 9344610589248:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -C fake-ca.crt -c server.crt -k server.key 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-noverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 14609596914240:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 14609596914240:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 14609596914240:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 14609596914240:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 14609596914240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out` 2073027041440:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 5795990710848:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 5795990710848:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 5795990710848:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 5795990710848:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out` 7677266782784:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 7677266782784:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 7677266782784:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 7677266782784:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: server: 7677266782784:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 1542394371488:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 15123710417472:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -C fake-ca.crt -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-verify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 12773320747584:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 12773320747584:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 12773320747584:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 12773320747584:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 12773320747584:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out` 11274528261152:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:s3_pkt.c:1498:SSL alert number 51 server: SSL_accept 0 6346896529984:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 6346896529984:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 6346896529984:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: 6346896529984:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out` 10522162707008:error:04FFF06A:rsa routines:CRYPTO_internal:block type is not 01:/usr/src/lib/libcrypto/rsa/rsa_pk1.c:103: 10522162707008:error:04FFF072:rsa routines:CRYPTO_internal:padding check failed:/usr/src/lib/libcrypto/rsa/rsa_eay.c:686: 0:error:1409441B:SSL routines:ssl3_read_bytes:tlsv1 alert decrypt error:ssl/record/rec_layer_s3.c:1544:SSL alert number 51 10522162707008:error:0DFFF006:asn1 encoding routines:CRYPTO_internal:EVP lib:/usr/src/lib/libcrypto/asn1/a_verify.c:155: server: 10522162707008:error:1404B41B:SSL routines:ST_CONNECT:tlsv1 alert decrypt error:/usr/src/lib/libssl/tls13_lib.c:150: 10522162707008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out server-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail client-cert-client-libressl-noca-cert-verify-server-openssl11-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 6995011470944:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14420684159552:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -C fake-ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out server-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out client-cert-client-openssl11-noca-cert-verify-server-libressl-fakeca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-verify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 11456722614848:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 11456722614848:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 1161470745152:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-nocert-certverify.out` 4440351665312:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: 13972487166528:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 server: SSL_accept -1 client: SSL_connect 0 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 9271424256576:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 7265461156512:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 7752274635328:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 5896028719680:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 5896028719680:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 10216380803648:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 10216380803648:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out` 11799560621792:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 8706771442240:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out` 13154284751424:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13154284751424:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 5572772055008:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 12917796624960:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 15069507091008:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 15069507091008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out` 2647360669472:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 7514111609408:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out` 17456705325632:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 17456705325632:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 11261313928608:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 14041855232576:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 12733961050688:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 12733961050688:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out` 11808911826016:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 16371138550336:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out` 17070380792384:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 17070380792384:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 2146999228064:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 3391692511808:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 11175167027776:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 11175167027776:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 3457196186176:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-noca-cert-certverify.out` 211469933120:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 1955995765280:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: client: SSL_connect 0 server: SSL_accept -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 262325512768:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 14631405700192:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 11402980186688:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-noca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 13330047793728:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 13330047793728:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-verify.out success ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 7241781992000:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 7241781992000:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 7949292276288:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-noca-cert-certverify.out` 16506888542560:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: 12243811969600:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 server: client: SSL_accept -1SSL_connect 0 ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 11426113219136:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 13926284229472:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 17505335822912:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-noca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 6266492062272:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 6266492062272:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-noverify.out success ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 8856737135168:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 8856737135168:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out` 16101956196928:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: SSL_connect 0 9186567165408:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 8469121541728:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 3588819413568:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 2251875322432:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2251875322432:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 3179023276608:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 3179023276608:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out` 3756624865856:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: SSL_connect 0 11156888925792:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 13432716265056:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 3196712991296:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 11397404179008:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 11397404179008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 5829732145728:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 5829732145728:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out` 8366318108640:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 4335281089088:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out` 6347978738240:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6347978738240:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 2514869387296:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 15040870120000:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out` 13117205301824:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13117205301824:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out` 17577082360096:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12881287670336:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out` 12933259684416:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 12933259684416:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: server: client: SSL_accept -1SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out` 13356141837792:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 7098878306880:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 16968760207936:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16968760207936:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out` 45219949088:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 12718072441408:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out` 6639773764160:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 6639773764160:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 9171782399392:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 1210927520320:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out` 2981277014592:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2981277014592:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out` 10962501544512:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: SSL_connect 0 15346233665568:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out` 15926332901664:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 97617959488:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 13724860435008:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 13724860435008:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 9351997925952:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9351997925952:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out` 8857035295296:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: SSL_connect 0 9913685625824:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-noverify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 7100119575392:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 12917097065024:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 347681061440:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 347681061440:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-noverify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-noverify.out success ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-noverify.out success ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out` 1507829586496:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 1507829586496:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out` 19169864256:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: 15242609523104:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: SSL_connect 0 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out` 13712687771616:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 1863386053184:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -c server.crt -k server.key -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 8441981762112:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 8441981762112:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-verify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out` 9869440969280:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 9869440969280:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-libressl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out` 10284839705152:error:14020418:SSL routines:CONNECT_CR_SESSION_TICKET:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 client: SSL_connect 0 5314174792096:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3360: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out` 0:error:1417C086:SSL routines:tls_process_client_certificate:certificate verify failed:ssl/statem/statem_srvr.c:3703: server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out server-cert-client-libressl-ca-cert-verify-server-openssl11-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out` 17258259264224:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 client: SSL_connect 0 14676577749568:error:140360B2:SSL routines:ACCEPT_SR_CERT:no certificate returned:/usr/src/lib/libssl/ssl_srvr.c:2444: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out -C ca.crt -c server.crt -k server.key -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out` 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_read 0 662061005376:error:1404A418:SSL routines:ST_ACCEPT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 662061005376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_server.c:908: server: SSL_accept -1 grep '^verify: fail' client-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail server-cert-client-openssl11-ca-cert-verify-server-libressl-noca-cert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-noverify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-verify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 5241373993536:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 5241373993536:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 5427453897280:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-nocert-certverify.out` 1018474171296:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: SSL_accept -1 1128807799360:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-nocert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 1417812380224:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 16001072308768:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 4196427119168:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-nocert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 16027895233088:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 16027895233088:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 16791092685376:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16791092685376:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out` 16756334151712:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 7377895324224:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out` 2239646964288:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 2239646964288:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 client: SSL_connect -1 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 6947994935456:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 1963991546432:error:14037418:SSL routines:ACCEPT_SR_KEY_EXCH:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-noverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 16973100087872:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 16973100087872:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out` 9816510926176:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 8052735498816:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out` 5858507967040:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 5858507967040:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 server: SSL_accept -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 6169827568096:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 2139733396032:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-verify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 937197169216:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 937197169216:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out` 570665728544:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:s3_pkt.c:1498:SSL alert number 48 server: SSL_accept 0 13778002967104:error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed:/usr/src/lib/libssl/ssl_clnt.c:1194: client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out` 14473816734272:error:1404B418:SSL routines:ST_CONNECT:tlsv1 alert unknown ca:/usr/src/lib/libssl/tls13_lib.c:150: 0:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1544:SSL alert number 48 14473816734272:error:14FFF086:SSL routines:(UNKNOWN)SSL_internal:certificate verify failed:/usr/src/lib/libssl/tls13_client.c:617: server: SSL_accept -1 client: SSL_connect -1 grep '^verify: fail' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 7994695078048:error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed:s3_clnt.c:1269: client: SSL_connect -1 17341203999296:error:14035418:SSL routines:ACCEPT_SR_CERT:tlsv1 alert unknown ca:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 48 server: SSL_accept 0 grep '^verify: fail' client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out` 0:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1915: client: SSL_connect -1 grep '^verify: fail' client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out server-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out client-cert-client-openssl11-ca-nocert-verify-server-libressl-ca-nocert-certverify.out:verify: fail ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out` grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-verify.out success ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt -c server.crt -k server.key -v 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out` grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out || { sleep 1; grep '^success$' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out; } success grep '^success$' client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-verify.out success ==== run-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 11615844686400:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 11615844686400:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 7453164489280:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl-ca-cert-certverify.out` 14876029772512:error:140890C7:SSL routines:ssl3_get_client_certificate:peer did not return a certificate:s3_srvr.c:3346: server: SSL_accept -1 4417788394048:error:14020410:SSL routines:CONNECT_CR_SESSION_TICKET:sslv3 alert handshake failure:/usr/src/lib/libssl/ssl_pkt.c:1007:SSL alert number 40 client: SSL_connect 0 ==== run-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-noverify-server-openssl11-ca-cert-certverify.out` 0:error:1417C0C7:SSL routines:tls_process_client_certificate:peer did not return a certificate:ssl/statem/statem_srvr.c:3689: server: SSL_accept -1 2115239086656:error:1404C45C:SSL routines:ST_OK:reason(1116):/usr/src/lib/libssl/tls13_lib.c:129:SSL alert number 116 client: SSL_read -1 ==== run-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 4778782328224:error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure:s3_pkt.c:1498:SSL alert number 40 client: SSL_connect 0 10911028603456:error:140360C7:SSL routines:ACCEPT_SR_CERT:peer did not return a certificate:/usr/src/lib/libssl/ssl_srvr.c:2434: server: SSL_accept -1 ==== run-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt -c server.crt -k server.key -vv 127.0.0.1 0 ! LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/client >client-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out -C ca.crt `sed -n 's/listen sock: //p' server-cert-client-openssl11-ca-nocert-noverify-server-libressl-ca-cert-certverify.out` 0:error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required:ssl/record/rec_layer_s3.c:1544:SSL alert number 116 client: SSL_read 0 8338897074752:error:1404A45C:SSL routines:ST_ACCEPT:reason(1116):/usr/src/lib/libssl/tls13_lib.c:150: 8338897074752:error:14FFF0C7:SSL routines:(UNKNOWN)SSL_internal:peer did not return a certificate:/usr/src/lib/libssl/tls13_server.c:876: server: SSL_accept -1 ==== run-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-libressl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/server >server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl-ca-cert-noverify.out success ==== run-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/eopenssl11 ../openssl11/server >server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/client >client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out` grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out; } success grep '^success$' client-cert-client-libressl-ca-nocert-verify-server-openssl11-ca-cert-noverify.out success ==== run-cert-client-openssl-ca-nocert-verify-server-libressl-ca-cert-noverify ==== LD_LIBRARY_PATH=/usr/local/lib/elibressl ../libressl/server >server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -c server.crt -k server.key 127.0.0.1 0 LD_LIBRARY_PATH=/usr/local/lib/eopenssl ../openssl/client >client-cert-client-openssl-ca-nocert-verify-server-libressl-ca-cert-noverify.out -C ca.crt -v `sed -n 's/listen sock: //p' server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-cert-noverify.out` grep '^success$' server-cert-client-openssl-ca-nocert-verify-server-libressl-ca-cert-noverify.out || { sleep 1; grep '^success$' server-cert-client-ope