0s autopkgtest [23:15:55]: starting date: 2024-03-04 0s autopkgtest [23:15:55]: git checkout: d9c0295 adt_testbed.py: supress warnings from apt using a shell pipeline 0s autopkgtest [23:15:55]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.chzqs143/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:jose,src:openssl --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=jose/11-3build1 openssl/3.0.10-1ubuntu5' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@lcy02-27.secgroup --name adt-noble-amd64-sssd-20240304-231555-juju-7f2275-prod-proposed-migration-environment-3 --image adt/ubuntu-noble-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 407s autopkgtest [23:22:42]: @@@@@@@@@@@@@@@@@@@@ test bed setup 408s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 408s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [1739 kB] 408s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [23.8 kB] 408s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 408s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [310 kB] 408s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 Packages [429 kB] 408s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main i386 Packages [297 kB] 408s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 c-n-f Metadata [3508 B] 408s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted i386 Packages [6228 B] 408s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 Packages [20.4 kB] 408s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 c-n-f Metadata [116 B] 408s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 Packages [2078 kB] 408s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe i386 Packages [664 kB] 408s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 c-n-f Metadata [9396 B] 408s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse i386 Packages [6356 B] 408s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 Packages [21.2 kB] 408s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 c-n-f Metadata [196 B] 410s Fetched 5729 kB in 1s (5972 kB/s) 411s Reading package lists... 415s Reading package lists... 415s Building dependency tree... 415s Reading state information... 415s Calculating upgrade... 416s The following packages will be REMOVED: 416s libssl3 416s The following NEW packages will be installed: 416s libssl3t64 416s The following packages will be upgraded: 416s openssl 416s 1 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 416s Need to get 2910 kB of archives. 416s After this operation, 3072 B of additional disk space will be used. 416s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 openssl amd64 3.0.10-1ubuntu5 [1001 kB] 416s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libssl3t64 amd64 3.0.10-1ubuntu5 [1909 kB] 416s Fetched 2910 kB in 0s (38.2 MB/s) 416s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71809 files and directories currently installed.) 416s Preparing to unpack .../openssl_3.0.10-1ubuntu5_amd64.deb ... 416s Unpacking openssl (3.0.10-1ubuntu5) over (3.0.10-1ubuntu4) ... 416s dpkg: libssl3:amd64: dependency problems, but removing anyway as you requested: 416s wget depends on libssl3 (>= 3.0.0). 416s tnftp depends on libssl3 (>= 3.0.0). 416s tcpdump depends on libssl3 (>= 3.0.0). 416s systemd-resolved depends on libssl3 (>= 3.0.0). 416s systemd depends on libssl3 (>= 3.0.0). 416s sudo depends on libssl3 (>= 3.0.0). 416s sbsigntool depends on libssl3 (>= 3.0.0). 416s rsync depends on libssl3 (>= 3.0.0). 416s python3-cryptography depends on libssl3 (>= 3.0.0). 416s openssh-server depends on libssl3 (>= 3.0.10). 416s openssh-client depends on libssl3 (>= 3.0.10). 416s mokutil depends on libssl3 (>= 3.0.0). 416s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 416s libtss2-esys-3.0.2-0:amd64 depends on libssl3 (>= 3.0.0). 416s libsystemd-shared:amd64 depends on libssl3 (>= 3.0.0). 416s libssh-4:amd64 depends on libssl3 (>= 3.0.0). 416s libsasl2-modules:amd64 depends on libssl3 (>= 3.0.0). 416s libsasl2-2:amd64 depends on libssl3 (>= 3.0.0). 416s libpython3.12-minimal:amd64 depends on libssl3 (>= 3.0.0). 416s libpython3.11-minimal:amd64 depends on libssl3 (>= 3.0.0). 416s libnvme1 depends on libssl3 (>= 3.0.0). 416s libkrb5-3:amd64 depends on libssl3 (>= 3.0.0). 416s libkmod2:amd64 depends on libssl3 (>= 3.0.0). 416s libfido2-1:amd64 depends on libssl3 (>= 3.0.0). 416s libcurl4:amd64 depends on libssl3 (>= 3.0.0). 416s libcryptsetup12:amd64 depends on libssl3 (>= 3.0.0). 416s kmod depends on libssl3 (>= 3.0.0). 416s dhcpcd-base depends on libssl3 (>= 3.0.0). 416s coreutils depends on libssl3 (>= 3.0.0). 416s bind9-libs:amd64 depends on libssl3 (>= 3.0.0). 416s 416s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71809 files and directories currently installed.) 416s Removing libssl3:amd64 (3.0.10-1ubuntu4) ... 416s Selecting previously unselected package libssl3t64:amd64. 416s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71798 files and directories currently installed.) 416s Preparing to unpack .../libssl3t64_3.0.10-1ubuntu5_amd64.deb ... 416s Unpacking libssl3t64:amd64 (3.0.10-1ubuntu5) ... 417s Setting up libssl3t64:amd64 (3.0.10-1ubuntu5) ... 417s Setting up openssl (3.0.10-1ubuntu5) ... 417s Processing triggers for man-db (2.12.0-3) ... 417s Processing triggers for libc-bin (2.39-0ubuntu2) ... 417s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 417s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 417s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 418s Reading package lists... 418s Building dependency tree... 418s Reading state information... 418s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 419s sh: Attempting to set up Debian/Ubuntu apt sources automatically 419s sh: Distribution appears to be Ubuntu 422s Reading package lists... 423s Building dependency tree... 423s Reading state information... 423s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 423s eatmydata is already the newest version (131-1). 423s dbus is already the newest version (1.14.10-4ubuntu1). 423s dbus set to manually installed. 423s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 423s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 423s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 423s Reading package lists... 423s Building dependency tree... 423s Reading state information... 424s rng-tools-debian is already the newest version (2.4). 424s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 424s Reading package lists... 424s Building dependency tree... 424s Reading state information... 424s haveged is already the newest version (1.9.14-1ubuntu1). 424s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 424s Reading package lists... 425s Building dependency tree... 425s Reading state information... 425s The following packages will be REMOVED: 425s cloud-init* python3-configobj* python3-debconf* 425s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 425s After this operation, 3248 kB disk space will be freed. 425s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71811 files and directories currently installed.) 425s Removing cloud-init (24.1-0ubuntu1) ... 426s Removing python3-configobj (5.0.8-3) ... 426s Removing python3-debconf (1.5.86) ... 426s Processing triggers for man-db (2.12.0-3) ... 426s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71422 files and directories currently installed.) 426s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 427s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 427s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 427s Reading package lists... 428s Building dependency tree... 428s Reading state information... 428s linux-generic is already the newest version (6.8.0-11.11+1). 428s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 428s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 428s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 428s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 428s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 428s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 432s Reading package lists... 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 432s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 432s Reading package lists... 433s Building dependency tree... 433s Reading state information... 433s Calculating upgrade... 433s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 433s Reading package lists... 433s Building dependency tree... 433s Reading state information... 434s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 434s autopkgtest [23:23:09]: rebooting testbed after setup commands that affected boot 465s autopkgtest [23:23:40]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 14 00:29:05 UTC 2024 465s autopkgtest [23:23:40]: testbed dpkg architecture: amd64 465s autopkgtest [23:23:40]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 466s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 466s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 466s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 473s Get:1 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (dsc) [5269 B] 473s Get:2 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (tar) [7983 kB] 473s Get:3 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (asc) [833 B] 473s Get:4 http://ftpmaster.internal/ubuntu noble/main sssd 2.9.4-1ubuntu1 (diff) [48.4 kB] 474s gpgv: Signature made Mon Feb 26 21:56:54 2024 UTC 474s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 474s gpgv: Can't check signature: No public key 474s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1ubuntu1.dsc: no acceptable signature found 474s autopkgtest [23:23:49]: testing package sssd version 2.9.4-1ubuntu1 474s autopkgtest [23:23:49]: build not needed 474s autopkgtest [23:23:49]: test ldap-user-group-ldap-auth: preparing testbed 475s Reading package lists... 476s Building dependency tree... 476s Reading state information... 476s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 476s Starting 2 pkgProblemResolver with broken count: 0 476s Done 476s Done 477s Starting pkgProblemResolver with broken count: 0 477s Starting 2 pkgProblemResolver with broken count: 0 477s Done 477s The following additional packages will be installed: 477s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 477s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 477s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 477s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 477s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 477s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 477s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 477s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 477s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 477s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 477s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 477s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 477s Suggested packages: 477s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 477s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 477s Recommended packages: 477s cracklib-runtime libsasl2-modules-gssapi-mit 477s | libsasl2-modules-gssapi-heimdal 477s The following NEW packages will be installed: 477s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 477s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 477s libevent-2.1-7 libini-config5 libipa-hbac-dev libipa-hbac0 libjose0 libkrad0 477s libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 477s libpam-pwquality libpam-sss libpath-utils1 libpwquality-common libpwquality1 477s libref-array1 libsmbclient libsss-certmap-dev libsss-certmap0 477s libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev libsss-nss-idmap0 477s libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0 libverto-libevent1 477s libverto1 libwbclient0 python3-libipa-hbac python3-libsss-nss-idmap 477s python3-sss samba-libs slapd sssd sssd-ad sssd-ad-common sssd-common 477s sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 sssd-krb5-common sssd-ldap 477s sssd-passkey sssd-proxy sssd-tools tcl-expect tcl8.6 477s 0 upgraded, 64 newly installed, 0 to remove and 0 not upgraded. 477s 1 not fully installed or removed. 477s Need to get 12.7 MB of archives. 477s After this operation, 48.8 MB of additional disk space will be used. 477s Get:1 http://ftpmaster.internal/ubuntu noble/main amd64 libtalloc2 amd64 2.4.2-1 [27.2 kB] 477s Get:2 http://ftpmaster.internal/ubuntu noble/main amd64 libtdb1 amd64 1.4.10-1 [46.7 kB] 477s Get:3 http://ftpmaster.internal/ubuntu noble/main amd64 libtevent0 amd64 0.16.1-1 [42.1 kB] 477s Get:4 http://ftpmaster.internal/ubuntu noble/main amd64 libldb2 amd64 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [186 kB] 477s Get:5 http://ftpmaster.internal/ubuntu noble/main amd64 python3-sss amd64 2.9.4-1ubuntu1 [46.6 kB] 477s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-idmap0 amd64 2.9.4-1ubuntu1 [21.4 kB] 477s Get:7 http://ftpmaster.internal/ubuntu noble/main amd64 libnss-sss amd64 2.9.4-1ubuntu1 [31.2 kB] 477s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 libcrack2 amd64 2.9.6-5.1 [28.8 kB] 477s Get:9 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality-common all 1.4.5-3 [7658 B] 477s Get:10 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality1 amd64 1.4.5-3 [13.4 kB] 477s Get:11 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-pwquality amd64 1.4.5-3 [11.7 kB] 477s Get:12 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-sss amd64 2.9.4-1ubuntu1 [50.0 kB] 477s Get:13 http://ftpmaster.internal/ubuntu noble/main amd64 libc-ares2 amd64 1.27.0-1 [73.6 kB] 477s Get:14 http://ftpmaster.internal/ubuntu noble/main amd64 libdhash1 amd64 0.6.2-2 [8408 B] 477s Get:15 http://ftpmaster.internal/ubuntu noble/main amd64 libbasicobjects0 amd64 0.6.2-2 [5562 B] 477s Get:16 http://ftpmaster.internal/ubuntu noble/main amd64 libcollection4 amd64 0.6.2-2 [22.9 kB] 477s Get:17 http://ftpmaster.internal/ubuntu noble/main amd64 libpath-utils1 amd64 0.6.2-2 [8590 B] 477s Get:18 http://ftpmaster.internal/ubuntu noble/main amd64 libref-array1 amd64 0.6.2-2 [7114 B] 477s Get:19 http://ftpmaster.internal/ubuntu noble/main amd64 libini-config5 amd64 0.6.2-2 [43.3 kB] 477s Get:20 http://ftpmaster.internal/ubuntu noble/main amd64 libnfsidmap1 amd64 1:2.6.3-3ubuntu1 [47.8 kB] 477s Get:21 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-certmap0 amd64 2.9.4-1ubuntu1 [46.8 kB] 477s Get:22 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-nss-idmap0 amd64 2.9.4-1ubuntu1 [30.0 kB] 477s Get:23 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-common amd64 2.9.4-1ubuntu1 [1139 kB] 477s Get:24 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common-data amd64 0.8-13ubuntu2 [29.5 kB] 477s Get:25 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common3 amd64 0.8-13ubuntu2 [23.5 kB] 477s Get:26 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-client3 amd64 0.8-13ubuntu2 [27.4 kB] 477s Get:27 http://ftpmaster.internal/ubuntu noble/main amd64 libwbclient0 amd64 2:4.19.5+dfsg-1ubuntu1 [69.8 kB] 477s Get:28 http://ftpmaster.internal/ubuntu noble/main amd64 samba-libs amd64 2:4.19.5+dfsg-1ubuntu1 [6017 kB] 477s Get:29 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ad-common amd64 2.9.4-1ubuntu1 [77.1 kB] 477s Get:30 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-krb5-common amd64 2.9.4-1ubuntu1 [88.8 kB] 477s Get:31 http://ftpmaster.internal/ubuntu noble/main amd64 libsmbclient amd64 2:4.19.5+dfsg-1ubuntu1 [62.6 kB] 477s Get:32 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ad amd64 2.9.4-1ubuntu1 [136 kB] 477s Get:33 http://ftpmaster.internal/ubuntu noble/main amd64 libipa-hbac0 amd64 2.9.4-1ubuntu1 [16.9 kB] 477s Get:34 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ipa amd64 2.9.4-1ubuntu1 [221 kB] 477s Get:35 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-krb5 amd64 2.9.4-1ubuntu1 [14.5 kB] 477s Get:36 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ldap amd64 2.9.4-1ubuntu1 [31.3 kB] 477s Get:37 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-proxy amd64 2.9.4-1ubuntu1 [44.6 kB] 477s Get:38 http://ftpmaster.internal/ubuntu noble/main amd64 sssd amd64 2.9.4-1ubuntu1 [4120 B] 477s Get:39 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-dbus amd64 2.9.4-1ubuntu1 [104 kB] 477s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 libjose0 amd64 11-3build1 [44.3 kB] 477s Get:41 http://ftpmaster.internal/ubuntu noble/main amd64 libevent-2.1-7 amd64 2.1.12-stable-9 [144 kB] 477s Get:42 http://ftpmaster.internal/ubuntu noble/main amd64 libverto-libevent1 amd64 0.3.1-1ubuntu5 [5962 B] 477s Get:43 http://ftpmaster.internal/ubuntu noble/main amd64 libverto1 amd64 0.3.1-1ubuntu5 [10.4 kB] 477s Get:44 http://ftpmaster.internal/ubuntu noble/main amd64 libkrad0 amd64 1.20.1-5build1 [22.2 kB] 477s Get:45 http://ftpmaster.internal/ubuntu noble/universe amd64 sssd-idp amd64 2.9.4-1ubuntu1 [27.4 kB] 477s Get:46 http://ftpmaster.internal/ubuntu noble/universe amd64 sssd-kcm amd64 2.9.4-1ubuntu1 [140 kB] 477s Get:47 http://ftpmaster.internal/ubuntu noble/universe amd64 sssd-passkey amd64 2.9.4-1ubuntu1 [32.4 kB] 477s Get:48 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-tools amd64 2.9.4-1ubuntu1 [97.8 kB] 477s Get:49 http://ftpmaster.internal/ubuntu noble/main amd64 libipa-hbac-dev amd64 2.9.4-1ubuntu1 [6664 B] 477s Get:50 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-certmap-dev amd64 2.9.4-1ubuntu1 [5736 B] 477s Get:51 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-idmap-dev amd64 2.9.4-1ubuntu1 [8382 B] 477s Get:52 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-nss-idmap-dev amd64 2.9.4-1ubuntu1 [6718 B] 477s Get:53 http://ftpmaster.internal/ubuntu noble/universe amd64 libnss-sudo all 1.9.15p5-3ubuntu1 [14.9 kB] 477s Get:54 http://ftpmaster.internal/ubuntu noble/universe amd64 libsss-sudo amd64 2.9.4-1ubuntu1 [20.8 kB] 477s Get:55 http://ftpmaster.internal/ubuntu noble/universe amd64 python3-libipa-hbac amd64 2.9.4-1ubuntu1 [16.8 kB] 477s Get:56 http://ftpmaster.internal/ubuntu noble/universe amd64 python3-libsss-nss-idmap amd64 2.9.4-1ubuntu1 [9192 B] 477s Get:57 http://ftpmaster.internal/ubuntu noble/main amd64 libltdl7 amd64 2.4.7-7 [40.5 kB] 477s Get:58 http://ftpmaster.internal/ubuntu noble/main amd64 libodbc2 amd64 2.3.12-1 [159 kB] 477s Get:59 http://ftpmaster.internal/ubuntu noble/main amd64 slapd amd64 2.6.7+dfsg-1~exp1ubuntu1 [1553 kB] 477s Get:60 http://ftpmaster.internal/ubuntu noble/main amd64 ldap-utils amd64 2.6.7+dfsg-1~exp1ubuntu1 [153 kB] 477s Get:61 http://ftpmaster.internal/ubuntu noble/main amd64 libtcl8.6 amd64 8.6.13+dfsg-2 [984 kB] 477s Get:62 http://ftpmaster.internal/ubuntu noble/main amd64 tcl8.6 amd64 8.6.13+dfsg-2 [14.7 kB] 477s Get:63 http://ftpmaster.internal/ubuntu noble/universe amd64 tcl-expect amd64 5.45.4-2build1 [105 kB] 477s Get:64 http://ftpmaster.internal/ubuntu noble/universe amd64 expect amd64 5.45.4-2build1 [137 kB] 478s Preconfiguring packages ... 478s Fetched 12.7 MB in 0s (26.2 MB/s) 478s Selecting previously unselected package libtalloc2:amd64. 478s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71367 files and directories currently installed.) 478s Preparing to unpack .../00-libtalloc2_2.4.2-1_amd64.deb ... 478s Unpacking libtalloc2:amd64 (2.4.2-1) ... 478s Selecting previously unselected package libtdb1:amd64. 478s Preparing to unpack .../01-libtdb1_1.4.10-1_amd64.deb ... 478s Unpacking libtdb1:amd64 (1.4.10-1) ... 478s Selecting previously unselected package libtevent0:amd64. 478s Preparing to unpack .../02-libtevent0_0.16.1-1_amd64.deb ... 478s Unpacking libtevent0:amd64 (0.16.1-1) ... 478s Selecting previously unselected package libldb2:amd64. 478s Preparing to unpack .../03-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_amd64.deb ... 478s Unpacking libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 478s Selecting previously unselected package python3-sss. 478s Preparing to unpack .../04-python3-sss_2.9.4-1ubuntu1_amd64.deb ... 478s Unpacking python3-sss (2.9.4-1ubuntu1) ... 478s Selecting previously unselected package libsss-idmap0. 478s Preparing to unpack .../05-libsss-idmap0_2.9.4-1ubuntu1_amd64.deb ... 478s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 478s Selecting previously unselected package libnss-sss:amd64. 478s Preparing to unpack .../06-libnss-sss_2.9.4-1ubuntu1_amd64.deb ... 478s Unpacking libnss-sss:amd64 (2.9.4-1ubuntu1) ... 478s Selecting previously unselected package libcrack2:amd64. 478s Preparing to unpack .../07-libcrack2_2.9.6-5.1_amd64.deb ... 478s Unpacking libcrack2:amd64 (2.9.6-5.1) ... 478s Selecting previously unselected package libpwquality-common. 478s Preparing to unpack .../08-libpwquality-common_1.4.5-3_all.deb ... 478s Unpacking libpwquality-common (1.4.5-3) ... 478s Selecting previously unselected package libpwquality1:amd64. 478s Preparing to unpack .../09-libpwquality1_1.4.5-3_amd64.deb ... 478s Unpacking libpwquality1:amd64 (1.4.5-3) ... 478s Selecting previously unselected package libpam-pwquality:amd64. 478s Preparing to unpack .../10-libpam-pwquality_1.4.5-3_amd64.deb ... 478s Unpacking libpam-pwquality:amd64 (1.4.5-3) ... 479s Selecting previously unselected package libpam-sss:amd64. 479s Preparing to unpack .../11-libpam-sss_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking libpam-sss:amd64 (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libc-ares2:amd64. 479s Preparing to unpack .../12-libc-ares2_1.27.0-1_amd64.deb ... 479s Unpacking libc-ares2:amd64 (1.27.0-1) ... 479s Selecting previously unselected package libdhash1:amd64. 479s Preparing to unpack .../13-libdhash1_0.6.2-2_amd64.deb ... 479s Unpacking libdhash1:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libbasicobjects0:amd64. 479s Preparing to unpack .../14-libbasicobjects0_0.6.2-2_amd64.deb ... 479s Unpacking libbasicobjects0:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libcollection4:amd64. 479s Preparing to unpack .../15-libcollection4_0.6.2-2_amd64.deb ... 479s Unpacking libcollection4:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libpath-utils1:amd64. 479s Preparing to unpack .../16-libpath-utils1_0.6.2-2_amd64.deb ... 479s Unpacking libpath-utils1:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libref-array1:amd64. 479s Preparing to unpack .../17-libref-array1_0.6.2-2_amd64.deb ... 479s Unpacking libref-array1:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libini-config5:amd64. 479s Preparing to unpack .../18-libini-config5_0.6.2-2_amd64.deb ... 479s Unpacking libini-config5:amd64 (0.6.2-2) ... 479s Selecting previously unselected package libnfsidmap1:amd64. 479s Preparing to unpack .../19-libnfsidmap1_1%3a2.6.3-3ubuntu1_amd64.deb ... 479s Unpacking libnfsidmap1:amd64 (1:2.6.3-3ubuntu1) ... 479s Selecting previously unselected package libsss-certmap0. 479s Preparing to unpack .../20-libsss-certmap0_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libsss-nss-idmap0. 479s Preparing to unpack .../21-libsss-nss-idmap0_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-common. 479s Preparing to unpack .../22-sssd-common_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-common (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libavahi-common-data:amd64. 479s Preparing to unpack .../23-libavahi-common-data_0.8-13ubuntu2_amd64.deb ... 479s Unpacking libavahi-common-data:amd64 (0.8-13ubuntu2) ... 479s Selecting previously unselected package libavahi-common3:amd64. 479s Preparing to unpack .../24-libavahi-common3_0.8-13ubuntu2_amd64.deb ... 479s Unpacking libavahi-common3:amd64 (0.8-13ubuntu2) ... 479s Selecting previously unselected package libavahi-client3:amd64. 479s Preparing to unpack .../25-libavahi-client3_0.8-13ubuntu2_amd64.deb ... 479s Unpacking libavahi-client3:amd64 (0.8-13ubuntu2) ... 479s Selecting previously unselected package libwbclient0:amd64. 479s Preparing to unpack .../26-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 479s Unpacking libwbclient0:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 479s Selecting previously unselected package samba-libs:amd64. 479s Preparing to unpack .../27-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 479s Unpacking samba-libs:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 479s Selecting previously unselected package sssd-ad-common. 479s Preparing to unpack .../28-sssd-ad-common_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-krb5-common. 479s Preparing to unpack .../29-sssd-krb5-common_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libsmbclient:amd64. 479s Preparing to unpack .../30-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 479s Unpacking libsmbclient:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 479s Selecting previously unselected package sssd-ad. 479s Preparing to unpack .../31-sssd-ad_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libipa-hbac0. 479s Preparing to unpack .../32-libipa-hbac0_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-ipa. 479s Preparing to unpack .../33-sssd-ipa_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-krb5. 479s Preparing to unpack .../34-sssd-krb5_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-ldap. 479s Preparing to unpack .../35-sssd-ldap_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-proxy. 479s Preparing to unpack .../36-sssd-proxy_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd. 479s Preparing to unpack .../37-sssd_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package sssd-dbus. 479s Preparing to unpack .../38-sssd-dbus_2.9.4-1ubuntu1_amd64.deb ... 479s Unpacking sssd-dbus (2.9.4-1ubuntu1) ... 479s Selecting previously unselected package libjose0:amd64. 480s Preparing to unpack .../39-libjose0_11-3build1_amd64.deb ... 480s Unpacking libjose0:amd64 (11-3build1) ... 480s Selecting previously unselected package libevent-2.1-7:amd64. 480s Preparing to unpack .../40-libevent-2.1-7_2.1.12-stable-9_amd64.deb ... 480s Unpacking libevent-2.1-7:amd64 (2.1.12-stable-9) ... 480s Selecting previously unselected package libverto-libevent1:amd64. 480s Preparing to unpack .../41-libverto-libevent1_0.3.1-1ubuntu5_amd64.deb ... 480s Unpacking libverto-libevent1:amd64 (0.3.1-1ubuntu5) ... 480s Selecting previously unselected package libverto1:amd64. 480s Preparing to unpack .../42-libverto1_0.3.1-1ubuntu5_amd64.deb ... 480s Unpacking libverto1:amd64 (0.3.1-1ubuntu5) ... 480s Selecting previously unselected package libkrad0:amd64. 480s Preparing to unpack .../43-libkrad0_1.20.1-5build1_amd64.deb ... 480s Unpacking libkrad0:amd64 (1.20.1-5build1) ... 480s Selecting previously unselected package sssd-idp. 480s Preparing to unpack .../44-sssd-idp_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking sssd-idp (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package sssd-kcm. 480s Preparing to unpack .../45-sssd-kcm_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking sssd-kcm (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package sssd-passkey. 480s Preparing to unpack .../46-sssd-passkey_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking sssd-passkey (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package sssd-tools. 480s Preparing to unpack .../47-sssd-tools_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking sssd-tools (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libipa-hbac-dev. 480s Preparing to unpack .../48-libipa-hbac-dev_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking libipa-hbac-dev (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libsss-certmap-dev. 480s Preparing to unpack .../49-libsss-certmap-dev_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking libsss-certmap-dev (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libsss-idmap-dev. 480s Preparing to unpack .../50-libsss-idmap-dev_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking libsss-idmap-dev (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libsss-nss-idmap-dev. 480s Preparing to unpack .../51-libsss-nss-idmap-dev_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libnss-sudo. 480s Preparing to unpack .../52-libnss-sudo_1.9.15p5-3ubuntu1_all.deb ... 480s Unpacking libnss-sudo (1.9.15p5-3ubuntu1) ... 480s Selecting previously unselected package libsss-sudo. 480s Preparing to unpack .../53-libsss-sudo_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking libsss-sudo (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package python3-libipa-hbac. 480s Preparing to unpack .../54-python3-libipa-hbac_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking python3-libipa-hbac (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package python3-libsss-nss-idmap. 480s Preparing to unpack .../55-python3-libsss-nss-idmap_2.9.4-1ubuntu1_amd64.deb ... 480s Unpacking python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 480s Selecting previously unselected package libltdl7:amd64. 480s Preparing to unpack .../56-libltdl7_2.4.7-7_amd64.deb ... 480s Unpacking libltdl7:amd64 (2.4.7-7) ... 480s Selecting previously unselected package libodbc2:amd64. 480s Preparing to unpack .../57-libodbc2_2.3.12-1_amd64.deb ... 480s Unpacking libodbc2:amd64 (2.3.12-1) ... 480s Selecting previously unselected package slapd. 480s Preparing to unpack .../58-slapd_2.6.7+dfsg-1~exp1ubuntu1_amd64.deb ... 480s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 480s Selecting previously unselected package ldap-utils. 480s Preparing to unpack .../59-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_amd64.deb ... 480s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 480s Selecting previously unselected package libtcl8.6:amd64. 480s Preparing to unpack .../60-libtcl8.6_8.6.13+dfsg-2_amd64.deb ... 480s Unpacking libtcl8.6:amd64 (8.6.13+dfsg-2) ... 480s Selecting previously unselected package tcl8.6. 480s Preparing to unpack .../61-tcl8.6_8.6.13+dfsg-2_amd64.deb ... 480s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 480s Selecting previously unselected package tcl-expect:amd64. 480s Preparing to unpack .../62-tcl-expect_5.45.4-2build1_amd64.deb ... 480s Unpacking tcl-expect:amd64 (5.45.4-2build1) ... 480s Selecting previously unselected package expect. 480s Preparing to unpack .../63-expect_5.45.4-2build1_amd64.deb ... 480s Unpacking expect (5.45.4-2build1) ... 480s Setting up libpwquality-common (1.4.5-3) ... 480s Setting up libpath-utils1:amd64 (0.6.2-2) ... 480s Setting up libnfsidmap1:amd64 (1:2.6.3-3ubuntu1) ... 480s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 480s Setting up libbasicobjects0:amd64 (0.6.2-2) ... 480s Setting up libsss-idmap-dev (2.9.4-1ubuntu1) ... 480s Setting up libtdb1:amd64 (1.4.10-1) ... 480s Setting up libc-ares2:amd64 (1.27.0-1) ... 480s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 480s Setting up libjose0:amd64 (11-3build1) ... 480s Setting up libwbclient0:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 480s Setting up libtalloc2:amd64 (2.4.2-1) ... 480s Setting up libdhash1:amd64 (0.6.2-2) ... 480s Setting up libtevent0:amd64 (0.16.1-1) ... 480s Setting up libavahi-common-data:amd64 (0.8-13ubuntu2) ... 480s Setting up libevent-2.1-7:amd64 (2.1.12-stable-9) ... 480s Setting up libtcl8.6:amd64 (8.6.13+dfsg-2) ... 480s Setting up libltdl7:amd64 (2.4.7-7) ... 480s Setting up libcrack2:amd64 (2.9.6-5.1) ... 480s Setting up libcollection4:amd64 (0.6.2-2) ... 480s Setting up libodbc2:amd64 (2.3.12-1) ... 480s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 480s Setting up python3-libipa-hbac (2.9.4-1ubuntu1) ... 480s Setting up libref-array1:amd64 (0.6.2-2) ... 480s Setting up libnss-sudo (1.9.15p5-3ubuntu1) ... 480s Setting up libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 480s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 480s Setting up libnss-sss:amd64 (2.9.4-1ubuntu1) ... 481s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 481s Creating new user openldap... done. 481s Creating initial configuration... done. 481s Creating LDAP directory... done. 481s Setting up tcl8.6 (8.6.13+dfsg-2) ... 481s Setting up libsss-sudo (2.9.4-1ubuntu1) ... 481s Setting up libsss-nss-idmap-dev (2.9.4-1ubuntu1) ... 481s Setting up libipa-hbac-dev (2.9.4-1ubuntu1) ... 481s Setting up libini-config5:amd64 (0.6.2-2) ... 481s Setting up libavahi-common3:amd64 (0.8-13ubuntu2) ... 481s Setting up tcl-expect:amd64 (5.45.4-2build1) ... 481s Setting up python3-sss (2.9.4-1ubuntu1) ... 482s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 482s Setting up libpwquality1:amd64 (1.4.5-3) ... 482s Setting up python3-libsss-nss-idmap (2.9.4-1ubuntu1) ... 482s Setting up libavahi-client3:amd64 (0.8-13ubuntu2) ... 482s Setting up expect (5.45.4-2build1) ... 482s Setting up libpam-pwquality:amd64 (1.4.5-3) ... 482s Setting up samba-libs:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 482s Setting up libsss-certmap-dev (2.9.4-1ubuntu1) ... 482s Setting up libsmbclient:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 482s Setting up libpam-sss:amd64 (2.9.4-1ubuntu1) ... 482s Setting up sssd-common (2.9.4-1ubuntu1) ... 482s Creating SSSD system user & group... 482s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 482s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 482s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 482s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 483s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 483s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 483s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 483s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 483s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 484s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 484s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 484s sssd-autofs.service is a disabled or a static unit, not starting it. 484s sssd-nss.service is a disabled or a static unit, not starting it. 484s sssd-pam.service is a disabled or a static unit, not starting it. 484s sssd-ssh.service is a disabled or a static unit, not starting it. 484s sssd-sudo.service is a disabled or a static unit, not starting it. 484s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 484s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 484s Setting up sssd-kcm (2.9.4-1ubuntu1) ... 485s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 485s sssd-kcm.service is a disabled or a static unit, not starting it. 485s Setting up sssd-dbus (2.9.4-1ubuntu1) ... 485s sssd-ifp.service is a disabled or a static unit, not starting it. 485s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 485s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 486s sssd-pac.service is a disabled or a static unit, not starting it. 486s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 486s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 486s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 486s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 486s Setting up sssd-ad (2.9.4-1ubuntu1) ... 486s Setting up sssd-tools (2.9.4-1ubuntu1) ... 486s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 486s Setting up sssd (2.9.4-1ubuntu1) ... 486s Setting up libverto-libevent1:amd64 (0.3.1-1ubuntu5) ... 486s Setting up libverto1:amd64 (0.3.1-1ubuntu5) ... 486s Setting up libkrad0:amd64 (1.20.1-5build1) ... 486s Setting up sssd-passkey (2.9.4-1ubuntu1) ... 486s Setting up sssd-idp (2.9.4-1ubuntu1) ... 486s Setting up autopkgtest-satdep (0) ... 486s Processing triggers for libc-bin (2.39-0ubuntu2) ... 486s Processing triggers for ufw (0.36.2-5) ... 486s Processing triggers for man-db (2.12.0-3) ... 487s Processing triggers for dbus (1.14.10-4ubuntu1) ... 493s (Reading database ... 72652 files and directories currently installed.) 493s Removing autopkgtest-satdep (0) ... 493s autopkgtest [23:24:08]: test ldap-user-group-ldap-auth: [----------------------- 493s + . debian/tests/util 493s + . debian/tests/common-tests 493s + mydomain=example.com 493s + myhostname=ldap.example.com 493s + mysuffix=dc=example,dc=com 493s + admin_dn=cn=admin,dc=example,dc=com 493s + admin_pw=secret 493s + ldap_user=testuser1 493s + ldap_user_pw=testuser1secret 493s + ldap_group=ldapusers 493s + adjust_hostname ldap.example.com 493s + local myhostname=ldap.example.com 493s + echo ldap.example.com 493s + hostname ldap.example.com 493s + grep -qE ldap.example.com /etc/hosts 493s + echo 127.0.1.10 ldap.example.com 493s + reconfigure_slapd 493s + debconf-set-selections 493s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 493s + dpkg-reconfigure -fnoninteractive -pcritical slapd 494s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 494s Moving old database directory to /var/backups: 494s - directory unknown... done. 494s Creating initial configuration... done. 494s Creating LDAP directory... done. 494s + generate_certs ldap.example.com 494s + local cn=ldap.example.com 494s + local cert=/etc/ldap/server.pem 494s + local key=/etc/ldap/server.key 494s + local cnf=/etc/ldap/openssl.cnf 494s + cat 494s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 494s .........................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 494s ..............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 494s ----- 494s + chmod 0640 /etc/ldap/server.key 494s + chgrp openldap /etc/ldap/server.key 494s + [ ! -f /etc/ldap/server.pem ] 494s + [ ! -f /etc/ldap/server.key ] 494s + enable_ldap_ssl 494s + cat 494s + cat 494s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 494s modifying entry "cn=config" 494s 494s + populate_ldap_rfc2307 494s + cat 494s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 494s + configure_sssd_ldap_rfc2307 494s + cat 494s adding new entry "ou=People,dc=example,dc=com" 494s 494s adding new entry "ou=Group,dc=example,dc=com" 494s 494s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 494s 494s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 494s 494s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 494s 494s + chmod 0600 /etc/sssd/sssd.conf 494s + systemctl restart sssd 494s + enable_pam_mkhomedir 494s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 494s + echo session optional pam_mkhomedir.so 494s + run_common_tests 494s + echo Assert local user databases do not have our LDAP test data 494s Assert local user databases do not have our LDAP test data 494s + check_local_user testuser1 494s + local local_user=testuser1 494s + grep -q ^testuser1 /etc/passwd 494s + check_local_group testuser1 494s + local local_group=testuser1 494s + grep -q ^testuser1 /etc/group 494s + check_local_group ldapusers 494s + local local_group=ldapusers 494s + grep -q ^ldapusers /etc/group 494s + echo The LDAP user is known to the system via getent 494s + check_getent_userThe LDAP user is known to the system via getent 494s testuser1 494s + local getent_user=testuser1 494s + local output 494s + getent passwd testuser1 494s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 494s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 494s + echo The LDAP user's private group is known to the system via getent 494s + check_getent_group testuser1 494s + local getent_group=testuser1 494s + local output 494s The LDAP user's private group is known to the system via getent 494s + getent group testuser1 494s The LDAP group ldapusers is known to the system via getent 494s + output=testuser1:*:10001:testuser1 494s + [ -z testuser1:*:10001:testuser1 ] 494s + echo The LDAP group ldapusers is known to the system via getent 494s + check_getent_group ldapusers 494s + local getent_group=ldapusers 494s + local output 494s + getent group ldapusers 494s The id(1) command can resolve the group membership of the LDAP user 494s + output=ldapusers:*:10100:testuser1 494s + [ -z ldapusers:*:10100:testuser1 ] 494s + echo The id(1) command can resolve the group membership of the LDAP user 494s + id -Gn testuser1 494s + output=testuser1 ldapusers 494s + [ testuser1 ldapusers != testuser1 ldapusers ] 494s + echo The LDAP user can login on a terminal 494s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 494s The LDAP user can login on a terminal 494s spawn login 494s ldap.example.com login: testuser1 494s Password: 494s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic x86_64) 494s 494s * Documentation: https://help.ubuntu.com 494s * Management: https://landscape.canonical.com 494s * Support: https://ubuntu.com/pro 494s 494s 494s The programs included with the Ubuntu system are free software; 494s the exact distribution terms for each program are described in the 494s individual files in /usr/share/doc/*/copyright. 494s 494s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 494s applicable law. 494s 494s 494s The programs included with the Ubuntu system are free software; 494s the exact distribution terms for each program are described in the 494s individual files in /usr/share/doc/*/copyright. 494s 494s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 494s applicable law. 494s 494s Creating directory '/home/testuser1'. 494s [?2004htestuser1@ldap:~$ id -un 494s [?2004l testuser1 495s [?2004htestuser1@ldap:~$ autopkgtest [23:24:10]: test ldap-user-group-ldap-auth: -----------------------] 495s autopkgtest [23:24:10]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 495s ldap-user-group-ldap-auth PASS 495s autopkgtest [23:24:10]: test ldap-user-group-krb5-auth: preparing testbed 496s Reading package lists... 496s Building dependency tree... 496s Reading state information... 497s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 497s Starting 2 pkgProblemResolver with broken count: 0 497s Done 497s Done 497s Starting pkgProblemResolver with broken count: 0 497s Starting 2 pkgProblemResolver with broken count: 0 497s Done 498s The following additional packages will be installed: 498s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 498s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 498s Suggested packages: 498s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 498s The following NEW packages will be installed: 498s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 498s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 498s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 498s 1 not fully installed or removed. 498s Need to get 598 kB of archives. 498s After this operation, 2107 kB of additional disk space will be used. 498s Get:1 http://ftpmaster.internal/ubuntu noble/main amd64 libgssrpc4 amd64 1.20.1-5build1 [57.0 kB] 498s Get:2 http://ftpmaster.internal/ubuntu noble/main amd64 libkadm5clnt-mit12 amd64 1.20.1-5build1 [40.2 kB] 498s Get:3 http://ftpmaster.internal/ubuntu noble/main amd64 libkdb5-10 amd64 1.20.1-5build1 [39.9 kB] 498s Get:4 http://ftpmaster.internal/ubuntu noble/main amd64 libkadm5srv-mit12 amd64 1.20.1-5build1 [53.2 kB] 498s Get:5 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-user amd64 1.20.1-5build1 [109 kB] 498s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 krb5-config all 2.7 [22.0 kB] 498s Get:7 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-kdc amd64 1.20.1-5build1 [180 kB] 498s Get:8 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-admin-server amd64 1.20.1-5build1 [96.5 kB] 498s Preconfiguring packages ... 499s Fetched 598 kB in 0s (13.3 MB/s) 499s Selecting previously unselected package libgssrpc4:amd64. 499s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72652 files and directories currently installed.) 499s Preparing to unpack .../0-libgssrpc4_1.20.1-5build1_amd64.deb ... 499s Unpacking libgssrpc4:amd64 (1.20.1-5build1) ... 499s Selecting previously unselected package libkadm5clnt-mit12:amd64. 499s Preparing to unpack .../1-libkadm5clnt-mit12_1.20.1-5build1_amd64.deb ... 499s Unpacking libkadm5clnt-mit12:amd64 (1.20.1-5build1) ... 499s Selecting previously unselected package libkdb5-10:amd64. 499s Preparing to unpack .../2-libkdb5-10_1.20.1-5build1_amd64.deb ... 499s Unpacking libkdb5-10:amd64 (1.20.1-5build1) ... 499s Selecting previously unselected package libkadm5srv-mit12:amd64. 499s Preparing to unpack .../3-libkadm5srv-mit12_1.20.1-5build1_amd64.deb ... 499s Unpacking libkadm5srv-mit12:amd64 (1.20.1-5build1) ... 499s Selecting previously unselected package krb5-user. 499s Preparing to unpack .../4-krb5-user_1.20.1-5build1_amd64.deb ... 499s Unpacking krb5-user (1.20.1-5build1) ... 499s Selecting previously unselected package krb5-config. 499s Preparing to unpack .../5-krb5-config_2.7_all.deb ... 499s Unpacking krb5-config (2.7) ... 499s Selecting previously unselected package krb5-kdc. 499s Preparing to unpack .../6-krb5-kdc_1.20.1-5build1_amd64.deb ... 499s Unpacking krb5-kdc (1.20.1-5build1) ... 499s Selecting previously unselected package krb5-admin-server. 499s Preparing to unpack .../7-krb5-admin-server_1.20.1-5build1_amd64.deb ... 499s Unpacking krb5-admin-server (1.20.1-5build1) ... 499s Setting up libgssrpc4:amd64 (1.20.1-5build1) ... 499s Setting up krb5-config (2.7) ... 499s Setting up libkadm5clnt-mit12:amd64 (1.20.1-5build1) ... 499s Setting up libkdb5-10:amd64 (1.20.1-5build1) ... 499s Setting up libkadm5srv-mit12:amd64 (1.20.1-5build1) ... 499s Setting up krb5-user (1.20.1-5build1) ... 499s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 499s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 499s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 499s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 499s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 499s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 499s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 499s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 499s Setting up krb5-kdc (1.20.1-5build1) ... 500s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 500s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 500s Setting up krb5-admin-server (1.20.1-5build1) ... 501s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 501s Setting up autopkgtest-satdep (0) ... 501s Processing triggers for man-db (2.12.0-3) ... 502s Processing triggers for libc-bin (2.39-0ubuntu2) ... 505s (Reading database ... 72745 files and directories currently installed.) 505s Removing autopkgtest-satdep (0) ... 505s autopkgtest [23:24:20]: test ldap-user-group-krb5-auth: [----------------------- 505s + . debian/tests/util 505s + . debian/tests/common-tests 505s + mydomain=example.com 505s + myhostname=ldap.example.com 505s + mysuffix=dc=example,dc=com 505s + myrealm=EXAMPLE.COM 505s + admin_dn=cn=admin,dc=example,dc=com 505s + admin_pw=secret 505s + ldap_user=testuser1 505s + ldap_user_pw=testuser1secret 505s + kerberos_principal_pw=testuser1kerberos 505s + ldap_group=ldapusers 505s + adjust_hostname ldap.example.com 505s + local myhostname=ldap.example.com 505s + echo ldap.example.com 505s + hostname ldap.example.com 505s + grep -qE ldap.example.com /etc/hosts 505s + reconfigure_slapd 505s + debconf-set-selections 505s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu1-20240304-232409.ldapdb 505s + dpkg-reconfigure -fnoninteractive -pcritical slapd 506s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 506s Moving old database directory to /var/backups: 506s - directory unknown... done. 506s Creating initial configuration... done. 506s Creating LDAP directory... done. 506s + generate_certs ldap.example.com 506s + local cn=ldap.example.com 506s + local cert=/etc/ldap/server.pem 506s + local key=/etc/ldap/server.key 506s + local cnf=/etc/ldap/openssl.cnf 506s + cat 506s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 506s ......................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 506s ............++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 506s ----- 506s + chmod 0640 /etc/ldap/server.key 506s + chgrp openldap /etc/ldap/server.key 506s + [ ! -f /etc/ldap/server.pem ] 506s + [ ! -f /etc/ldap/server.key ] 506s + enable_ldap_ssl 506s + cat 506s + cat 506s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 506s modifying entry "cn=config" 506s 506s + populate_ldap_rfc2307 506s + cat 506s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 506s + create_realm EXAMPLE.COM ldap.example.com 506s + local realm_name=EXAMPLE.COM 506s + local kerberos_server=ldap.example.com 506s + rm -rf /var/lib/krb5kdc/* 506s adding new entry "ou=People,dc=example,dc=com" 506s 506s adding new entry "ou=Group,dc=example,dc=com" 506s 506s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 506s 506s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 506s 506s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 506s 506s + rm -rf /etc/krb5kdc/kdc.conf 506s + rm -f /etc/krb5.keytab 506s + cat 506s + cat 506s + echo # */admin * 506s + kdb5_util create -s -P secretpassword 506s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 506s master key name 'K/M@EXAMPLE.COM' 506s + systemctl restart krb5-kdc.service krb5-admin-server.service 506s + create_krb_principal testuser1 testuser1kerberos 506s + local principal=testuser1 506s + local password=testuser1kerberos 506s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 506s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 506s Authenticating as principal root/admin@EXAMPLE.COM with password. 506s Principal "testuser1@EXAMPLE.COM" created. 506s + configure_sssd_ldap_rfc2307_krb5_auth 506s + cat 506s + chmod 0600 /etc/sssd/sssd.conf 506s + systemctl restart sssd 506s + enable_pam_mkhomedir 506s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 506s + run_common_tests 506s + echo Assert local user databases do not have our LDAP test data 506s + check_local_user testuser1 506s + local local_user=testuser1 506s + grep -q ^testuser1 /etc/passwd 506s Assert local user databases do not have our LDAP test data 506s + check_local_group testuser1 506s + local local_group=testuser1 506s + grep -q ^testuser1 /etc/group 506s + check_local_group ldapusers 506s + local local_group=ldapusers 506s + grep -q ^ldapusers /etc/group 506s The LDAP user is known to the system via getent 506s + echo The LDAP user is known to the system via getent 506s + check_getent_user testuser1 506s + local getent_user=testuser1 506s + local output 506s + getent passwd testuser1 507s The LDAP user's private group is known to the system via getent 507s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 507s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 507s + echo The LDAP user's private group is known to the system via getent 507s + check_getent_group testuser1 507s + local getent_group=testuser1 507s + local output 507s + getent group testuser1 507s The LDAP group ldapusers is known to the system via getent 507s + output=testuser1:*:10001:testuser1 507s + [ -z testuser1:*:10001:testuser1 ] 507s + echo The LDAP group ldapusers is known to the system via getent 507s + check_getent_group ldapusers 507s + local getent_group=ldapusers 507s + local output 507s + getent group ldapusers 507s + output=ldapusers:*:10100:testuser1 507s + [ -z ldapusers:*:10100:testuser1 ] 507s + echo The id(1) command can resolve the group membership of the LDAP user 507s The id(1) command can resolve the group membership of the LDAP user 507s + id -Gn testuser1 507s + The Kerberos principal can login on a terminal 507s output=testuser1 ldapusers 507s + [ testuser1 ldapusers != testuser1 ldapusers ] 507s + echo The Kerberos principal can login on a terminal 507s + kdestroy 507s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 507s spawn login 507s ldap.example.com login: testuser1 507s Password: 507s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic x86_64) 507s 507s * Documentation: https://help.ubuntu.com 507s * Management: https://landscape.canonical.com 507s * Support: https://ubuntu.com/pro 507s 507s 507s The programs included with the Ubuntu system are free software; 507s the exact distribution terms for each program are described in the 507s individual files in /usr/share/doc/*/copyright. 507s 507s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 507s applicable law. 507s 507s Last login: Mon Mar 4 23:24:09 UTC 2024 on pts/0 507s [?2004htestuser1@ldap:~$ id -un 507s [?2004l testuser1 507s [?2004htestuser1@ldap:~$ klist 507s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_WRVOUz 507s Default principal: testuser1@EXAMPLE.COM 507s 507s Valid starting Expires Service principal 507s 03/04/24 23:24:22 03/05/24 09:24:22 krbtgt/EXAMPLE.COM@EXAMPLE.COMautopkgtest [23:24:22]: test ldap-user-group-krb5-auth: -----------------------] 507s ldap-user-group-krb5-auth PASS 507s autopkgtest [23:24:22]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 507s autopkgtest [23:24:22]: test sssd-softhism2-certificates-tests.sh: preparing testbed 928s autopkgtest [23:31:23]: @@@@@@@@@@@@@@@@@@@@ test bed setup 928s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 928s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [311 kB] 928s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [23.8 kB] 928s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [1739 kB] 928s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [3976 B] 928s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main i386 Packages [299 kB] 928s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 Packages [432 kB] 928s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 c-n-f Metadata [3508 B] 928s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted i386 Packages [6228 B] 928s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 Packages [20.4 kB] 928s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 c-n-f Metadata [116 B] 928s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/universe i386 Packages [669 kB] 928s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 Packages [2084 kB] 928s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 c-n-f Metadata [9396 B] 928s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 Packages [21.2 kB] 928s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse i386 Packages [6356 B] 928s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 c-n-f Metadata [196 B] 931s Fetched 5746 kB in 1s (7270 kB/s) 931s Reading package lists... 935s Reading package lists... 935s Building dependency tree... 935s Reading state information... 935s Calculating upgrade... 935s The following packages will be REMOVED: 935s libssl3 935s The following NEW packages will be installed: 935s libssl3t64 935s The following packages will be upgraded: 935s openssl 935s 1 upgraded, 1 newly installed, 1 to remove and 0 not upgraded. 935s Need to get 2910 kB of archives. 935s After this operation, 3072 B of additional disk space will be used. 935s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 openssl amd64 3.0.10-1ubuntu5 [1001 kB] 935s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libssl3t64 amd64 3.0.10-1ubuntu5 [1909 kB] 936s Fetched 2910 kB in 0s (55.7 MB/s) 936s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71809 files and directories currently installed.) 936s Preparing to unpack .../openssl_3.0.10-1ubuntu5_amd64.deb ... 936s Unpacking openssl (3.0.10-1ubuntu5) over (3.0.10-1ubuntu4) ... 936s dpkg: libssl3:amd64: dependency problems, but removing anyway as you requested: 936s wget depends on libssl3 (>= 3.0.0). 936s tnftp depends on libssl3 (>= 3.0.0). 936s tcpdump depends on libssl3 (>= 3.0.0). 936s systemd-resolved depends on libssl3 (>= 3.0.0). 936s systemd depends on libssl3 (>= 3.0.0). 936s sudo depends on libssl3 (>= 3.0.0). 936s sbsigntool depends on libssl3 (>= 3.0.0). 936s rsync depends on libssl3 (>= 3.0.0). 936s python3-cryptography depends on libssl3 (>= 3.0.0). 936s openssh-server depends on libssl3 (>= 3.0.10). 936s openssh-client depends on libssl3 (>= 3.0.10). 936s mokutil depends on libssl3 (>= 3.0.0). 936s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 936s libtss2-esys-3.0.2-0:amd64 depends on libssl3 (>= 3.0.0). 936s libsystemd-shared:amd64 depends on libssl3 (>= 3.0.0). 936s libssh-4:amd64 depends on libssl3 (>= 3.0.0). 936s libsasl2-modules:amd64 depends on libssl3 (>= 3.0.0). 936s libsasl2-2:amd64 depends on libssl3 (>= 3.0.0). 936s libpython3.12-minimal:amd64 depends on libssl3 (>= 3.0.0). 936s libpython3.11-minimal:amd64 depends on libssl3 (>= 3.0.0). 936s libnvme1 depends on libssl3 (>= 3.0.0). 936s libkrb5-3:amd64 depends on libssl3 (>= 3.0.0). 936s libkmod2:amd64 depends on libssl3 (>= 3.0.0). 936s libfido2-1:amd64 depends on libssl3 (>= 3.0.0). 936s libcurl4:amd64 depends on libssl3 (>= 3.0.0). 936s libcryptsetup12:amd64 depends on libssl3 (>= 3.0.0). 936s kmod depends on libssl3 (>= 3.0.0). 936s dhcpcd-base depends on libssl3 (>= 3.0.0). 936s coreutils depends on libssl3 (>= 3.0.0). 936s bind9-libs:amd64 depends on libssl3 (>= 3.0.0). 936s 936s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71809 files and directories currently installed.) 936s Removing libssl3:amd64 (3.0.10-1ubuntu4) ... 936s Selecting previously unselected package libssl3t64:amd64. 936s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71798 files and directories currently installed.) 936s Preparing to unpack .../libssl3t64_3.0.10-1ubuntu5_amd64.deb ... 936s Unpacking libssl3t64:amd64 (3.0.10-1ubuntu5) ... 936s Setting up libssl3t64:amd64 (3.0.10-1ubuntu5) ... 936s Setting up openssl (3.0.10-1ubuntu5) ... 936s Processing triggers for man-db (2.12.0-3) ... 937s Processing triggers for libc-bin (2.39-0ubuntu2) ... 937s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 937s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 937s Reading package lists... 937s Building dependency tree... 937s Reading state information... 938s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 938s sh: Attempting to set up Debian/Ubuntu apt sources automatically 938s sh: Distribution appears to be Ubuntu 942s Reading package lists... 942s Building dependency tree... 942s Reading state information... 942s eatmydata is already the newest version (131-1). 942s dbus is already the newest version (1.14.10-4ubuntu1). 942s dbus set to manually installed. 942s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 942s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 942s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 942s Reading package lists... 942s Building dependency tree... 942s Reading state information... 943s rng-tools-debian is already the newest version (2.4). 943s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 943s Reading package lists... 943s Building dependency tree... 943s Reading state information... 943s haveged is already the newest version (1.9.14-1ubuntu1). 943s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 943s Reading package lists... 943s Building dependency tree... 943s Reading state information... 944s The following packages will be REMOVED: 944s cloud-init* python3-configobj* python3-debconf* 944s 0 upgraded, 0 newly installed, 3 to remove and 0 not upgraded. 944s After this operation, 3248 kB disk space will be freed. 944s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71811 files and directories currently installed.) 944s Removing cloud-init (24.1-0ubuntu1) ... 944s Removing python3-configobj (5.0.8-3) ... 945s Removing python3-debconf (1.5.86) ... 945s Processing triggers for man-db (2.12.0-3) ... 945s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71422 files and directories currently installed.) 945s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 945s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 945s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 946s Reading package lists... 946s Building dependency tree... 946s Reading state information... 946s linux-generic is already the newest version (6.8.0-11.11+1). 946s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 947s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 947s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 947s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 947s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 947s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 950s Reading package lists... 950s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 950s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 951s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 951s Reading package lists... 951s Building dependency tree... 951s Reading state information... 951s Calculating upgrade... 951s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 951s Reading package lists... 951s Building dependency tree... 951s Reading state information... 952s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 952s autopkgtest [23:31:47]: rebooting testbed after setup commands that affected boot 972s autopkgtest [23:32:07]: testbed dpkg architecture: amd64 974s Reading package lists... 974s Building dependency tree... 974s Reading state information... 974s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 974s Starting 2 pkgProblemResolver with broken count: 0 974s Done 975s Done 975s Starting pkgProblemResolver with broken count: 0 975s Starting 2 pkgProblemResolver with broken count: 0 975s Done 975s The following additional packages will be installed: 975s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 975s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 975s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 975s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 975s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 975s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 975s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 975s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 975s sssd-krb5-common sssd-ldap sssd-proxy 975s Suggested packages: 975s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 975s Recommended packages: 975s cracklib-runtime libsasl2-modules-gssapi-mit 975s | libsasl2-modules-gssapi-heimdal ldap-utils 975s The following NEW packages will be installed: 975s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 975s libbasicobjects0 libc-ares2 libcollection4 libcrack2 libdhash1 975s libevent-2.1-7 libgnutls-dane0 libini-config5 libipa-hbac0 libldb2 975s libnfsidmap1 libnss-sss libpam-pwquality libpam-sss libpath-utils1 975s libpwquality-common libpwquality1 libref-array1 libsmbclient libsofthsm2 975s libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 975s libtevent0 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 975s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 975s sssd-krb5-common sssd-ldap sssd-proxy 975s 0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded. 975s 1 not fully installed or removed. 975s Need to get 10.1 MB of archives. 975s After this operation, 39.2 MB of additional disk space will be used. 975s Get:1 http://ftpmaster.internal/ubuntu noble/main amd64 libevent-2.1-7 amd64 2.1.12-stable-9 [144 kB] 975s Get:2 http://ftpmaster.internal/ubuntu noble/main amd64 libunbound8 amd64 1.19.1-1ubuntu1 [440 kB] 975s Get:3 http://ftpmaster.internal/ubuntu noble/main amd64 libgnutls-dane0 amd64 3.8.3-1ubuntu1 [23.3 kB] 975s Get:4 http://ftpmaster.internal/ubuntu noble/universe amd64 gnutls-bin amd64 3.8.3-1ubuntu1 [270 kB] 975s Get:5 http://ftpmaster.internal/ubuntu noble/universe amd64 softhsm2-common amd64 2.6.1-2.2 [5810 B] 975s Get:6 http://ftpmaster.internal/ubuntu noble/universe amd64 libsofthsm2 amd64 2.6.1-2.2 [268 kB] 975s Get:7 http://ftpmaster.internal/ubuntu noble/universe amd64 softhsm2 amd64 2.6.1-2.2 [176 kB] 975s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 libtalloc2 amd64 2.4.2-1 [27.2 kB] 975s Get:9 http://ftpmaster.internal/ubuntu noble/main amd64 libtdb1 amd64 1.4.10-1 [46.7 kB] 975s Get:10 http://ftpmaster.internal/ubuntu noble/main amd64 libtevent0 amd64 0.16.1-1 [42.1 kB] 975s Get:11 http://ftpmaster.internal/ubuntu noble/main amd64 libldb2 amd64 2:2.8.0+samba4.19.5+dfsg-1ubuntu1 [186 kB] 975s Get:12 http://ftpmaster.internal/ubuntu noble/main amd64 python3-sss amd64 2.9.4-1ubuntu1 [46.6 kB] 975s Get:13 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-idmap0 amd64 2.9.4-1ubuntu1 [21.4 kB] 975s Get:14 http://ftpmaster.internal/ubuntu noble/main amd64 libnss-sss amd64 2.9.4-1ubuntu1 [31.2 kB] 975s Get:15 http://ftpmaster.internal/ubuntu noble/main amd64 libcrack2 amd64 2.9.6-5.1 [28.8 kB] 975s Get:16 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality-common all 1.4.5-3 [7658 B] 975s Get:17 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality1 amd64 1.4.5-3 [13.4 kB] 975s Get:18 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-pwquality amd64 1.4.5-3 [11.7 kB] 975s Get:19 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-sss amd64 2.9.4-1ubuntu1 [50.0 kB] 975s Get:20 http://ftpmaster.internal/ubuntu noble/main amd64 libc-ares2 amd64 1.27.0-1 [73.6 kB] 975s Get:21 http://ftpmaster.internal/ubuntu noble/main amd64 libdhash1 amd64 0.6.2-2 [8408 B] 975s Get:22 http://ftpmaster.internal/ubuntu noble/main amd64 libbasicobjects0 amd64 0.6.2-2 [5562 B] 975s Get:23 http://ftpmaster.internal/ubuntu noble/main amd64 libcollection4 amd64 0.6.2-2 [22.9 kB] 975s Get:24 http://ftpmaster.internal/ubuntu noble/main amd64 libpath-utils1 amd64 0.6.2-2 [8590 B] 975s Get:25 http://ftpmaster.internal/ubuntu noble/main amd64 libref-array1 amd64 0.6.2-2 [7114 B] 975s Get:26 http://ftpmaster.internal/ubuntu noble/main amd64 libini-config5 amd64 0.6.2-2 [43.3 kB] 975s Get:27 http://ftpmaster.internal/ubuntu noble/main amd64 libnfsidmap1 amd64 1:2.6.3-3ubuntu1 [47.8 kB] 975s Get:28 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-certmap0 amd64 2.9.4-1ubuntu1 [46.8 kB] 975s Get:29 http://ftpmaster.internal/ubuntu noble/main amd64 libsss-nss-idmap0 amd64 2.9.4-1ubuntu1 [30.0 kB] 975s Get:30 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-common amd64 2.9.4-1ubuntu1 [1139 kB] 976s Get:31 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common-data amd64 0.8-13ubuntu2 [29.5 kB] 976s Get:32 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common3 amd64 0.8-13ubuntu2 [23.5 kB] 976s Get:33 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-client3 amd64 0.8-13ubuntu2 [27.4 kB] 976s Get:34 http://ftpmaster.internal/ubuntu noble/main amd64 libwbclient0 amd64 2:4.19.5+dfsg-1ubuntu1 [69.8 kB] 976s Get:35 http://ftpmaster.internal/ubuntu noble/main amd64 samba-libs amd64 2:4.19.5+dfsg-1ubuntu1 [6017 kB] 976s Get:36 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ad-common amd64 2.9.4-1ubuntu1 [77.1 kB] 976s Get:37 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-krb5-common amd64 2.9.4-1ubuntu1 [88.8 kB] 976s Get:38 http://ftpmaster.internal/ubuntu noble/main amd64 libsmbclient amd64 2:4.19.5+dfsg-1ubuntu1 [62.6 kB] 976s Get:39 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ad amd64 2.9.4-1ubuntu1 [136 kB] 976s Get:40 http://ftpmaster.internal/ubuntu noble/main amd64 libipa-hbac0 amd64 2.9.4-1ubuntu1 [16.9 kB] 976s Get:41 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ipa amd64 2.9.4-1ubuntu1 [221 kB] 976s Get:42 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-krb5 amd64 2.9.4-1ubuntu1 [14.5 kB] 976s Get:43 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-ldap amd64 2.9.4-1ubuntu1 [31.3 kB] 976s Get:44 http://ftpmaster.internal/ubuntu noble/main amd64 sssd-proxy amd64 2.9.4-1ubuntu1 [44.6 kB] 976s Get:45 http://ftpmaster.internal/ubuntu noble/main amd64 sssd amd64 2.9.4-1ubuntu1 [4120 B] 976s Fetched 10.1 MB in 0s (39.5 MB/s) 976s Selecting previously unselected package libevent-2.1-7:amd64. 976s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71367 files and directories currently installed.) 976s Preparing to unpack .../00-libevent-2.1-7_2.1.12-stable-9_amd64.deb ... 976s Unpacking libevent-2.1-7:amd64 (2.1.12-stable-9) ... 976s Selecting previously unselected package libunbound8:amd64. 976s Preparing to unpack .../01-libunbound8_1.19.1-1ubuntu1_amd64.deb ... 976s Unpacking libunbound8:amd64 (1.19.1-1ubuntu1) ... 976s Selecting previously unselected package libgnutls-dane0:amd64. 976s Preparing to unpack .../02-libgnutls-dane0_3.8.3-1ubuntu1_amd64.deb ... 976s Unpacking libgnutls-dane0:amd64 (3.8.3-1ubuntu1) ... 976s Selecting previously unselected package gnutls-bin. 976s Preparing to unpack .../03-gnutls-bin_3.8.3-1ubuntu1_amd64.deb ... 976s Unpacking gnutls-bin (3.8.3-1ubuntu1) ... 976s Selecting previously unselected package softhsm2-common. 976s Preparing to unpack .../04-softhsm2-common_2.6.1-2.2_amd64.deb ... 976s Unpacking softhsm2-common (2.6.1-2.2) ... 976s Selecting previously unselected package libsofthsm2. 976s Preparing to unpack .../05-libsofthsm2_2.6.1-2.2_amd64.deb ... 976s Unpacking libsofthsm2 (2.6.1-2.2) ... 976s Selecting previously unselected package softhsm2. 976s Preparing to unpack .../06-softhsm2_2.6.1-2.2_amd64.deb ... 976s Unpacking softhsm2 (2.6.1-2.2) ... 976s Selecting previously unselected package libtalloc2:amd64. 976s Preparing to unpack .../07-libtalloc2_2.4.2-1_amd64.deb ... 976s Unpacking libtalloc2:amd64 (2.4.2-1) ... 976s Selecting previously unselected package libtdb1:amd64. 976s Preparing to unpack .../08-libtdb1_1.4.10-1_amd64.deb ... 976s Unpacking libtdb1:amd64 (1.4.10-1) ... 976s Selecting previously unselected package libtevent0:amd64. 976s Preparing to unpack .../09-libtevent0_0.16.1-1_amd64.deb ... 976s Unpacking libtevent0:amd64 (0.16.1-1) ... 976s Selecting previously unselected package libldb2:amd64. 976s Preparing to unpack .../10-libldb2_2%3a2.8.0+samba4.19.5+dfsg-1ubuntu1_amd64.deb ... 976s Unpacking libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 976s Selecting previously unselected package python3-sss. 976s Preparing to unpack .../11-python3-sss_2.9.4-1ubuntu1_amd64.deb ... 976s Unpacking python3-sss (2.9.4-1ubuntu1) ... 976s Selecting previously unselected package libsss-idmap0. 976s Preparing to unpack .../12-libsss-idmap0_2.9.4-1ubuntu1_amd64.deb ... 976s Unpacking libsss-idmap0 (2.9.4-1ubuntu1) ... 976s Selecting previously unselected package libnss-sss:amd64. 976s Preparing to unpack .../13-libnss-sss_2.9.4-1ubuntu1_amd64.deb ... 976s Unpacking libnss-sss:amd64 (2.9.4-1ubuntu1) ... 976s Selecting previously unselected package libcrack2:amd64. 976s Preparing to unpack .../14-libcrack2_2.9.6-5.1_amd64.deb ... 976s Unpacking libcrack2:amd64 (2.9.6-5.1) ... 977s Selecting previously unselected package libpwquality-common. 977s Preparing to unpack .../15-libpwquality-common_1.4.5-3_all.deb ... 977s Unpacking libpwquality-common (1.4.5-3) ... 977s Selecting previously unselected package libpwquality1:amd64. 977s Preparing to unpack .../16-libpwquality1_1.4.5-3_amd64.deb ... 977s Unpacking libpwquality1:amd64 (1.4.5-3) ... 977s Selecting previously unselected package libpam-pwquality:amd64. 977s Preparing to unpack .../17-libpam-pwquality_1.4.5-3_amd64.deb ... 977s Unpacking libpam-pwquality:amd64 (1.4.5-3) ... 977s Selecting previously unselected package libpam-sss:amd64. 977s Preparing to unpack .../18-libpam-sss_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking libpam-sss:amd64 (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package libc-ares2:amd64. 977s Preparing to unpack .../19-libc-ares2_1.27.0-1_amd64.deb ... 977s Unpacking libc-ares2:amd64 (1.27.0-1) ... 977s Selecting previously unselected package libdhash1:amd64. 977s Preparing to unpack .../20-libdhash1_0.6.2-2_amd64.deb ... 977s Unpacking libdhash1:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libbasicobjects0:amd64. 977s Preparing to unpack .../21-libbasicobjects0_0.6.2-2_amd64.deb ... 977s Unpacking libbasicobjects0:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libcollection4:amd64. 977s Preparing to unpack .../22-libcollection4_0.6.2-2_amd64.deb ... 977s Unpacking libcollection4:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libpath-utils1:amd64. 977s Preparing to unpack .../23-libpath-utils1_0.6.2-2_amd64.deb ... 977s Unpacking libpath-utils1:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libref-array1:amd64. 977s Preparing to unpack .../24-libref-array1_0.6.2-2_amd64.deb ... 977s Unpacking libref-array1:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libini-config5:amd64. 977s Preparing to unpack .../25-libini-config5_0.6.2-2_amd64.deb ... 977s Unpacking libini-config5:amd64 (0.6.2-2) ... 977s Selecting previously unselected package libnfsidmap1:amd64. 977s Preparing to unpack .../26-libnfsidmap1_1%3a2.6.3-3ubuntu1_amd64.deb ... 977s Unpacking libnfsidmap1:amd64 (1:2.6.3-3ubuntu1) ... 977s Selecting previously unselected package libsss-certmap0. 977s Preparing to unpack .../27-libsss-certmap0_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking libsss-certmap0 (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package libsss-nss-idmap0. 977s Preparing to unpack .../28-libsss-nss-idmap0_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-common. 977s Preparing to unpack .../29-sssd-common_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-common (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package libavahi-common-data:amd64. 977s Preparing to unpack .../30-libavahi-common-data_0.8-13ubuntu2_amd64.deb ... 977s Unpacking libavahi-common-data:amd64 (0.8-13ubuntu2) ... 977s Selecting previously unselected package libavahi-common3:amd64. 977s Preparing to unpack .../31-libavahi-common3_0.8-13ubuntu2_amd64.deb ... 977s Unpacking libavahi-common3:amd64 (0.8-13ubuntu2) ... 977s Selecting previously unselected package libavahi-client3:amd64. 977s Preparing to unpack .../32-libavahi-client3_0.8-13ubuntu2_amd64.deb ... 977s Unpacking libavahi-client3:amd64 (0.8-13ubuntu2) ... 977s Selecting previously unselected package libwbclient0:amd64. 977s Preparing to unpack .../33-libwbclient0_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 977s Unpacking libwbclient0:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 977s Selecting previously unselected package samba-libs:amd64. 977s Preparing to unpack .../34-samba-libs_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 977s Unpacking samba-libs:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 977s Selecting previously unselected package sssd-ad-common. 977s Preparing to unpack .../35-sssd-ad-common_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-ad-common (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-krb5-common. 977s Preparing to unpack .../36-sssd-krb5-common_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-krb5-common (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package libsmbclient:amd64. 977s Preparing to unpack .../37-libsmbclient_2%3a4.19.5+dfsg-1ubuntu1_amd64.deb ... 977s Unpacking libsmbclient:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 977s Selecting previously unselected package sssd-ad. 977s Preparing to unpack .../38-sssd-ad_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-ad (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package libipa-hbac0. 977s Preparing to unpack .../39-libipa-hbac0_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking libipa-hbac0 (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-ipa. 977s Preparing to unpack .../40-sssd-ipa_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-ipa (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-krb5. 977s Preparing to unpack .../41-sssd-krb5_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-krb5 (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-ldap. 977s Preparing to unpack .../42-sssd-ldap_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-ldap (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd-proxy. 977s Preparing to unpack .../43-sssd-proxy_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd-proxy (2.9.4-1ubuntu1) ... 977s Selecting previously unselected package sssd. 977s Preparing to unpack .../44-sssd_2.9.4-1ubuntu1_amd64.deb ... 977s Unpacking sssd (2.9.4-1ubuntu1) ... 977s Setting up libpwquality-common (1.4.5-3) ... 977s Setting up libpath-utils1:amd64 (0.6.2-2) ... 977s Setting up softhsm2-common (2.6.1-2.2) ... 978s 978s Creating config file /etc/softhsm/softhsm2.conf with new version 978s Setting up libnfsidmap1:amd64 (1:2.6.3-3ubuntu1) ... 978s Setting up libsss-idmap0 (2.9.4-1ubuntu1) ... 978s Setting up libbasicobjects0:amd64 (0.6.2-2) ... 978s Setting up libtdb1:amd64 (1.4.10-1) ... 978s Setting up libc-ares2:amd64 (1.27.0-1) ... 978s Setting up libwbclient0:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 978s Setting up libtalloc2:amd64 (2.4.2-1) ... 978s Setting up libdhash1:amd64 (0.6.2-2) ... 978s Setting up libtevent0:amd64 (0.16.1-1) ... 978s Setting up libavahi-common-data:amd64 (0.8-13ubuntu2) ... 978s Setting up libevent-2.1-7:amd64 (2.1.12-stable-9) ... 978s Setting up libcrack2:amd64 (2.9.6-5.1) ... 978s Setting up libcollection4:amd64 (0.6.2-2) ... 978s Setting up libipa-hbac0 (2.9.4-1ubuntu1) ... 978s Setting up libref-array1:amd64 (0.6.2-2) ... 978s Setting up libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-1ubuntu1) ... 978s Setting up libsss-nss-idmap0 (2.9.4-1ubuntu1) ... 978s Setting up libnss-sss:amd64 (2.9.4-1ubuntu1) ... 978s Setting up libsofthsm2 (2.6.1-2.2) ... 978s Setting up softhsm2 (2.6.1-2.2) ... 978s Setting up libini-config5:amd64 (0.6.2-2) ... 978s Setting up libavahi-common3:amd64 (0.8-13ubuntu2) ... 978s Setting up python3-sss (2.9.4-1ubuntu1) ... 978s Setting up libsss-certmap0 (2.9.4-1ubuntu1) ... 978s Setting up libunbound8:amd64 (1.19.1-1ubuntu1) ... 978s Setting up libpwquality1:amd64 (1.4.5-3) ... 978s Setting up libavahi-client3:amd64 (0.8-13ubuntu2) ... 978s Setting up libgnutls-dane0:amd64 (3.8.3-1ubuntu1) ... 978s Setting up libpam-pwquality:amd64 (1.4.5-3) ... 978s Setting up samba-libs:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 978s Setting up libsmbclient:amd64 (2:4.19.5+dfsg-1ubuntu1) ... 978s Setting up libpam-sss:amd64 (2.9.4-1ubuntu1) ... 978s Setting up gnutls-bin (3.8.3-1ubuntu1) ... 978s Setting up sssd-common (2.9.4-1ubuntu1) ... 978s Creating SSSD system user & group... 978s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 978s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 978s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 978s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 979s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 979s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 979s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 979s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 979s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 980s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 980s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 980s sssd-autofs.service is a disabled or a static unit, not starting it. 980s sssd-nss.service is a disabled or a static unit, not starting it. 980s sssd-pam.service is a disabled or a static unit, not starting it. 980s sssd-ssh.service is a disabled or a static unit, not starting it. 980s sssd-sudo.service is a disabled or a static unit, not starting it. 980s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 980s Setting up sssd-proxy (2.9.4-1ubuntu1) ... 980s Setting up sssd-ad-common (2.9.4-1ubuntu1) ... 981s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 981s sssd-pac.service is a disabled or a static unit, not starting it. 981s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 981s Setting up sssd-krb5-common (2.9.4-1ubuntu1) ... 981s Setting up sssd-krb5 (2.9.4-1ubuntu1) ... 981s Setting up sssd-ldap (2.9.4-1ubuntu1) ... 981s Setting up sssd-ad (2.9.4-1ubuntu1) ... 981s Setting up sssd-ipa (2.9.4-1ubuntu1) ... 981s Setting up sssd (2.9.4-1ubuntu1) ... 981s Setting up autopkgtest-satdep (0) ... 981s Processing triggers for man-db (2.12.0-3) ... 982s Processing triggers for libc-bin (2.39-0ubuntu2) ... 986s (Reading database ... 71955 files and directories currently installed.) 986s Removing autopkgtest-satdep (0) ... 990s autopkgtest [23:32:25]: test sssd-softhism2-certificates-tests.sh: [----------------------- 990s + '[' -z ubuntu ']' 990s + required_tools=(p11tool openssl softhsm2-util) 990s + for cmd in "${required_tools[@]}" 990s + command -v p11tool 990s + for cmd in "${required_tools[@]}" 990s + command -v openssl 990s + for cmd in "${required_tools[@]}" 990s + command -v softhsm2-util 990s + PIN=053350 990s +++ find /usr/lib/softhsm/libsofthsm2.so 990s +++ head -n 1 990s ++ realpath /usr/lib/softhsm/libsofthsm2.so 990s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 990s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 990s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 990s + '[' '!' -v NO_SSSD_TESTS ']' 990s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 990s + ca_db_arg=ca_db 990s ++ /usr/libexec/sssd/p11_child --help 990s + p11_child_help='Usage: p11_child [OPTION...] 990s -d, --debug-level=INT Debug level 990s --debug-timestamps=INT Add debug timestamps 990s --debug-microseconds=INT Show timestamps with microseconds 990s --dumpable=INT Allow core dumps 990s --debug-fd=INT An open file descriptor for the debug 990s logs 990s --logger=stderr|files|journald Set logger 990s --auth Run in auth mode 990s --pre Run in pre-auth mode 990s --wait_for_card Wait until card is available 990s --verification Run in verification mode 990s --pin Expect PIN on stdin 990s --keypad Expect PIN on keypad 990s --verify=STRING Tune validation 990s --ca_db=STRING CA DB to use 990s --module_name=STRING Module name for authentication 990s --token_name=STRING Token name for authentication 990s --key_id=STRING Key ID for authentication 990s --label=STRING Label for authentication 990s --certificate=STRING certificate to verify, base64 encoded 990s --uri=STRING PKCS#11 URI to restrict selection 990s --chain-id=LONG Tevent chain ID used for logging 990s purposes 990s 990s Help options: 990s -?, --help Show this help message 990s --usage Display brief usage message' 990s + echo 'Usage: p11_child [OPTION...] 990s -d, --debug-level=INT Debug level 990s --debug-timestamps=INT Add debug timestamps 990s --debug-microseconds=INT Show timestamps with microseconds 990s --dumpable=INT Allow core dumps 990s --debug-fd=INT An open file descriptor for the debug 990s logs 990s --logger=stderr|files|journald Set logger 990s --auth Run in auth mode 990s --pre Run in pre-auth mode 990s --wait_for_card Wait until card is available 990s --verification Run in verification mode 990s --pin Expect PIN on stdin 990s --keypad Expect PIN on keypad 990s --verify=STRING Tune validation 990s --ca_db=STRING CA DB to use 990s --module_name=STRING Module name for authentication 990s --token_name=STRING Token name for authentication 990s --key_id=STRING Key ID for authentication 990s --label=STRING Label for authentication 990s --certificate=STRING certificate to verify, base64 encoded 990s --uri=STRING PKCS#11 URI to restrict selection 990s --chain-id=LONG Tevent chain ID used for logging 990s purposes 990s 990s Help options: 990s -?, --help Show this help message 990s --usage Display brief usage message' 990s + grep nssdb -qs 990s + echo 'Usage: p11_child [OPTION...] 990s -d, --debug-level=INT Debug level 990s --debug-timestamps=INT Add debug timestamps 990s --debug-microseconds=INT Show timestamps with microseconds 990s --dumpable=INT Allow core dumps 990s --debug-fd=INT An open file descriptor for the debug 990s logs 990s --logger=stderr|files|journald Set logger 990s --auth Run in auth mode 990s --pre Run in pre-auth mode 990s --wait_for_card Wait until card is available 990s --verification Run in verification mode 990s --pin Expect PIN on stdin 990s --keypad Expect PIN on keypad 990s --verify=STRING Tune validation 990s --ca_db=STRING CA DB to use 990s --module_name=STRING Module name for authentication 990s --token_name=STRING Token name for authentication 990s --key_id=STRING Key ID for authentication 990s --label=STRING Label for authentication 990s --certificate=STRING certificate to verify, base64 encoded 990s --uri=STRING PKCS#11 URI to restrict selection 990s --chain-id=LONG Tevent chain ID used for logging 990s purposes 990s 990s Help options: 990s -?, --help Show this help message 990s --usage Display brief usage message' 990s + grep -qs -- --ca_db 990s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 990s ++ mktemp -d -t sssd-softhsm2-XXXXXX 990s + tmpdir=/tmp/sssd-softhsm2-8XEtt9 990s + keys_size=1024 990s + [[ ! -v KEEP_TEMPORARY_FILES ]] 990s + trap 'rm -rf "$tmpdir"' EXIT 990s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 990s + echo -n 01 990s + touch /tmp/sssd-softhsm2-8XEtt9/index.txt 990s + mkdir -p /tmp/sssd-softhsm2-8XEtt9/new_certs 990s + cat 990s + root_ca_key_pass=pass:random-root-CA-password-21256 990s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA-key.pem -passout pass:random-root-CA-password-21256 1024 990s + openssl req -passin pass:random-root-CA-password-21256 -batch -config /tmp/sssd-softhsm2-8XEtt9/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-8XEtt9/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 990s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 990s + cat 990s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-16300 990s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-16300 1024 990s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-16300 -config /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.config -key /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-21256 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-certificate-request.pem 990s + openssl req -text -noout -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-certificate-request.pem 990s Certificate Request: 990s Data: 990s Version: 1 (0x0) 990s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 990s Subject Public Key Info: 990s Public Key Algorithm: rsaEncryption 990s Public-Key: (1024 bit) 990s Modulus: 990s 00:cf:2f:d9:eb:8e:45:02:df:2d:17:fe:a8:ee:11: 990s a2:47:9e:bb:c0:4e:b0:3e:52:8e:4a:11:f9:b2:5f: 990s 95:23:58:82:49:39:38:89:24:cd:a1:5e:d3:5a:96: 990s 04:c4:2e:22:5b:e2:d9:f7:3f:fe:5b:14:1e:c1:0e: 990s cc:56:3a:92:64:a2:e7:0e:c3:b9:4f:72:46:da:2f: 990s 8c:64:92:00:53:99:8e:b9:c4:8d:1a:94:4f:0f:39: 990s bf:26:ce:6c:f5:85:cc:30:9c:08:72:7e:17:f7:1a: 990s fd:53:02:7e:1c:17:a3:de:be:79:cb:58:9e:b3:a4: 990s ca:36:ff:17:c4:02:8a:1d:33 990s Exponent: 65537 (0x10001) 990s Attributes: 990s (none) 990s Requested Extensions: 990s Signature Algorithm: sha256WithRSAEncryption 990s Signature Value: 990s 60:33:2c:a2:58:cb:b2:43:4a:36:d0:19:86:ee:f4:c2:ba:1f: 990s 7c:ce:15:06:f6:c5:08:c8:83:92:3a:fb:df:62:a2:2d:c7:16: 990s 71:6d:f3:5e:c6:73:f2:40:c4:62:d2:c4:73:4e:a5:bf:35:14: 990s de:db:c0:59:70:2d:4d:3c:2f:91:0e:e9:d0:13:b2:d5:dd:c9: 990s 8e:6b:75:d2:73:26:fd:3a:8b:d2:49:aa:eb:07:41:e8:21:5d: 990s 72:c0:17:2e:7b:c7:a1:9d:47:22:aa:ed:65:bb:d6:17:34:0c: 990s 10:d2:2f:ca:20:85:1a:ac:20:7a:3d:b5:ae:27:26:ae:2a:dd: 990s ab:e9 990s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-8XEtt9/test-root-CA.config -passin pass:random-root-CA-password-21256 -keyfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA-key.pem -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 990s Using configuration from /tmp/sssd-softhsm2-8XEtt9/test-root-CA.config 990s Check that the request matches the signature 990s Signature ok 990s Certificate Details: 990s Serial Number: 1 (0x1) 990s Validity 990s Not Before: Mar 4 23:32:25 2024 GMT 990s Not After : Mar 4 23:32:25 2025 GMT 990s Subject: 990s organizationName = Test Organization 990s organizationalUnitName = Test Organization Unit 990s commonName = Test Organization Intermediate CA 990s X509v3 extensions: 990s X509v3 Subject Key Identifier: 990s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 990s X509v3 Authority Key Identifier: 990s keyid:88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 990s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 990s serial:00 990s X509v3 Basic Constraints: 990s CA:TRUE 990s X509v3 Key Usage: critical 990s Digital Signature, Certificate Sign, CRL Sign 990s Certificate is to be certified until Mar 4 23:32:25 2025 GMT (365 days) 990s 990s Write out database with 1 new entries 990s Database updated 990s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem: OK 991s + cat 991s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-2528 991s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-2528 1024 991s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-2528 -config /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-16300 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-certificate-request.pem 991s + openssl req -text -noout -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-certificate-request.pem 991s Certificate Request: 991s Data: 991s Version: 1 (0x0) 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:e7:1f:0e:90:c5:75:b0:5d:12:55:3d:8d:4a:63: 991s 2e:0d:0b:eb:b4:5f:48:0c:f0:84:1c:5a:44:cc:55: 991s d6:72:81:0a:64:a7:33:bb:7a:ef:cf:c3:fb:2a:b3: 991s d0:4f:f2:73:35:13:f4:41:e1:16:4d:bb:c4:bd:cf: 991s 0c:22:9a:67:9a:5e:75:f8:c9:bf:0f:83:00:a1:21: 991s 85:7b:44:39:08:37:bd:13:be:3d:c8:d7:5e:f5:64: 991s 76:a4:43:6f:d8:37:09:ac:81:36:8b:03:5c:85:f5: 991s a9:f4:95:89:d3:a2:a4:f4:68:22:b5:3b:8b:36:bb: 991s e3:f6:dc:82:3c:2c:3f:d3:f3 991s Exponent: 65537 (0x10001) 991s Attributes: 991s (none) 991s Requested Extensions: 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 3d:7f:5e:1f:a1:f4:40:1b:f8:42:5a:56:39:e3:ad:7b:9e:7f: 991s 16:05:80:2f:c1:94:63:eb:9f:77:e2:1b:aa:92:24:d2:8b:d5: 991s 75:5a:fa:55:2d:3b:fb:9a:52:51:44:f4:a9:5e:ba:77:db:8a: 991s 1d:18:50:25:d2:95:ac:ef:6f:bc:4f:29:42:81:43:c3:af:ee: 991s bc:9d:18:50:3f:3e:78:4d:8a:68:47:8c:af:2b:05:6a:c9:e7: 991s b7:f4:46:7b:3d:04:b3:22:23:bd:b6:72:7d:05:69:c8:6d:3b: 991s 96:6c:1b:97:51:06:21:a0:bf:b7:2e:7c:05:97:25:9f:46:ad: 991s be:e0 991s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-16300 -keyfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s Using configuration from /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.config 991s Check that the request matches the signature 991s Signature ok 991s Certificate Details: 991s Serial Number: 2 (0x2) 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: 991s organizationName = Test Organization 991s organizationalUnitName = Test Organization Unit 991s commonName = Test Organization Sub Intermediate CA 991s X509v3 extensions: 991s X509v3 Subject Key Identifier: 991s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 991s X509v3 Authority Key Identifier: 991s keyid:E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 991s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 991s serial:01 991s X509v3 Basic Constraints: 991s CA:TRUE 991s X509v3 Key Usage: critical 991s Digital Signature, Certificate Sign, CRL Sign 991s Certificate is to be certified until Mar 4 23:32:25 2025 GMT (365 days) 991s 991s Write out database with 1 new entries 991s Database updated 991s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem: OK 991s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 991s error 20 at 0 depth lookup: unable to get local issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem: verification failed 991s + cat 991s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-28359 1024 991s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-28359 -key /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-request.pem 991s + openssl req -text -noout -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-request.pem 991s Certificate Request: 991s Data: 991s Version: 1 (0x0) 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s Attributes: 991s Requested Extensions: 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s a8:cf:97:7d:5a:2c:fc:89:90:d2:54:62:22:68:49:ac:ad:4d: 991s 9a:09:a2:21:a5:b7:19:0b:45:95:c8:63:3d:c9:49:34:45:04: 991s 2f:c4:6c:ad:5c:7b:f1:27:7e:5c:59:78:14:e9:ce:6d:01:88: 991s 4d:c1:bc:95:64:77:77:03:b8:fa:d9:b7:9a:ea:49:d6:31:0f: 991s b2:33:89:5d:5b:3e:04:27:3d:2e:4b:c6:1a:a3:03:c7:4e:72: 991s 3d:f3:76:26:c9:d8:ce:d3:1d:e8:60:de:91:c8:6e:c1:9d:d0: 991s 1f:6e:14:7b:16:14:c6:98:96:87:fa:d6:8c:8a:94:fa:e5:0f: 991s 6b:cc 991s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-8XEtt9/test-root-CA.config -passin pass:random-root-CA-password-21256 -keyfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA-key.pem -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s Using configuration from /tmp/sssd-softhsm2-8XEtt9/test-root-CA.config 991s Check that the request matches the signature 991s Signature ok 991s Certificate Details: 991s Serial Number: 3 (0x3) 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: 991s organizationName = Test Organization 991s organizationalUnitName = Test Organization Unit 991s commonName = Test Organization Root Trusted Certificate 0001 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Certificate is to be certified until Mar 4 23:32:25 2025 GMT (365 days) 991s 991s Write out database with 1 new entries 991s Database updated 991s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem: OK 991s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s error 20 at 0 depth lookup: unable to get local issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem: verification failed 991s + cat 991s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 991s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-6046 1024 991s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-6046 -key /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-request.pem 991s + openssl req -text -noout -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-request.pem 991s Certificate Request: 991s Data: 991s Version: 1 (0x0) 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 991s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 991s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 991s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 991s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 991s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 991s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 991s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 991s 52:ea:21:18:d3:05:2c:ef:cf 991s Exponent: 65537 (0x10001) 991s Attributes: 991s Requested Extensions: 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Intermediate CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 77:d2:07:16:f1:1e:4e:ac:d8:b5:85:5d:61:f8:28:36:d8:04: 991s 01:a5:ae:1c:e0:5a:17:89:df:2b:d6:44:ca:28:f3:26:c7:c6: 991s ad:d4:14:23:3e:a7:2a:be:eb:10:76:ca:91:b3:22:67:3b:07: 991s 97:95:54:a5:d2:ad:76:8b:6a:de:27:31:d3:d0:05:ac:99:7d: 991s 07:5a:2d:1c:39:d9:79:5f:b9:d8:9c:da:94:b2:7d:14:ae:10: 991s 0e:7f:10:cb:97:29:79:6a:de:6f:16:07:38:b5:ce:c5:a1:e9: 991s a6:ea:a8:17:2a:0b:93:f8:27:2a:cb:dd:c3:84:2d:c4:1c:50: 991s 8f:84 991s + openssl ca -passin pass:random-intermediate-CA-password-16300 -config /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s Using configuration from /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.config 991s Check that the request matches the signature 991s Signature ok 991s Certificate Details: 991s Serial Number: 4 (0x4) 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: 991s organizationName = Test Organization 991s organizationalUnitName = Test Organization Unit 991s commonName = Test Organization Intermediate Trusted Certificate 0001 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Intermediate CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Certificate is to be certified until Mar 4 23:32:25 2025 GMT (365 days) 991s 991s Write out database with 1 new entries 991s Database updated 991s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s This certificate should not be trusted fully 991s + echo 'This certificate should not be trusted fully' 991s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 991s error 2 at 1 depth lookup: unable to get issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 991s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem: OK 991s + cat 991s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 991s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-8057 1024 991s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-8057 -key /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 991s + openssl req -text -noout -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 991s Certificate Request: 991s Data: 991s Version: 1 (0x0) 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 991s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 991s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 991s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 991s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 991s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 991s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 991s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 991s 44:08:65:2a:58:59:f2:ba:19 991s Exponent: 65537 (0x10001) 991s Attributes: 991s Requested Extensions: 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Sub Intermediate CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 15:ac:b2:81:57:cc:dd:40:43:64:49:6c:91:84:fe:4a:31:9a: 991s ec:39:e9:fe:f2:51:59:2e:45:4a:67:b6:29:d3:4c:da:63:fb: 991s ce:8c:3b:7f:67:9f:b3:7a:10:eb:28:01:cb:70:c3:b9:26:b1: 991s 8a:bf:36:3b:39:da:07:00:b0:7d:c9:34:f9:b9:67:50:40:fc: 991s 62:54:8f:65:c2:ff:ff:75:c7:5f:13:cc:e2:58:7b:39:f9:c4: 991s ca:6a:b4:34:cb:4d:17:c4:ff:a3:91:56:38:81:57:64:47:5e: 991s b0:5f:af:4a:f9:26:29:02:8a:bf:b4:ea:c8:0a:b9:c7:f7:26: 991s cb:ab 991s + openssl ca -passin pass:random-sub-intermediate-CA-password-2528 -config /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s Using configuration from /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.config 991s Check that the request matches the signature 991s Signature ok 991s Certificate Details: 991s Serial Number: 5 (0x5) 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: 991s organizationName = Test Organization 991s organizationalUnitName = Test Organization Unit 991s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Sub Intermediate CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Certificate is to be certified until Mar 4 23:32:25 2025 GMT (365 days) 991s 991s Write out database with 1 new entries 991s Database updated 991s + openssl x509 -noout -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s This certificate should not be trusted fully 991s + echo 'This certificate should not be trusted fully' 991s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 991s error 2 at 1 depth lookup: unable to get issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 991s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 991s error 20 at 0 depth lookup: unable to get local issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 991s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 991s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s + local cmd=openssl 991s + shift 991s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 991s error 20 at 0 depth lookup: unable to get local issuer certificate 991s error /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 991s + echo 'Building a the full-chain CA file...' 991s Building a the full-chain CA file... 991s + cat /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s + cat /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 991s + cat /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 991s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 991s + openssl pkcs7 -print_certs -noout 991s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s 991s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 991s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s 991s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 991s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 991s 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem: OK 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem: OK 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem: OK 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem: OK 991s + openssl verify -CAfile /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 991s /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 991s + echo 'Certificates generation completed!' 991s + [[ -v NO_SSSD_TESTS ]] 991s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /dev/null 991s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /dev/null 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s Certificates generation completed! 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_ring=/dev/null 991s + local verify_option= 991s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_cn 991s + local key_name 991s + local tokens_dir 991s + local output_cert_file 991s + token_name= 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 991s + key_name=test-root-CA-trusted-certificate-0001 991s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s ++ sed -n 's/ *commonName *= //p' 991s + key_cn='Test Organization Root Trusted Certificate 0001' 991s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 991s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 991s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 991s + token_name='Test Organization Root Tr Token' 991s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 991s + local key_file 991s + local decrypted_key 991s + mkdir -p /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 991s + key_file=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key.pem 991s + decrypted_key=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 991s + cat 991s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 991s Slot 0 has a free/uninitialized token. 991s The token has been initialized and is reassigned to slot 2040380859 991s + softhsm2-util --show-slots 991s Available slots: 991s Slot 2040380859 991s Slot info: 991s Description: SoftHSM slot ID 0x799dbdbb 991s Manufacturer ID: SoftHSM project 991s Hardware version: 2.6 991s Firmware version: 2.6 991s Token present: yes 991s Token info: 991s Manufacturer ID: SoftHSM project 991s Model: SoftHSM v2 991s Hardware version: 2.6 991s Firmware version: 2.6 991s Serial number: 31464a0bf99dbdbb 991s Initialized: yes 991s User PIN init.: yes 991s Label: Test Organization Root Tr Token 991s Slot 1 991s Slot info: 991s Description: SoftHSM slot ID 0x1 991s Manufacturer ID: SoftHSM project 991s Hardware version: 2.6 991s Firmware version: 2.6 991s Token present: yes 991s Token info: 991s Manufacturer ID: SoftHSM project 991s Model: SoftHSM v2 991s Hardware version: 2.6 991s Firmware version: 2.6 991s Serial number: 991s Initialized: no 991s User PIN init.: no 991s Label: 991s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 991s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-28359 -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 991s writing RSA key 991s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 991s + rm /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001-key-decrypted.pem 991s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 991s Object 0: 991s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 991s Type: X.509 Certificate (RSA-1024) 991s Expires: Tue Mar 4 23:32:25 2025 991s Label: Test Organization Root Trusted Certificate 0001 991s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 991s 991s + echo 'Test Organization Root Tr Token' 991s Test Organization Root Tr Token 991s + '[' -n '' ']' 991s + local output_base_name=SSSD-child-708 991s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-708.output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-708.pem 991s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 991s [p11_child[1988]] [main] (0x0400): p11_child started. 991s [p11_child[1988]] [main] (0x2000): Running in [pre-auth] mode. 991s [p11_child[1988]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[1988]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[1988]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 991s [p11_child[1988]] [do_work] (0x0040): init_verification failed. 991s [p11_child[1988]] [main] (0x0020): p11_child failed (5) 991s + return 2 991s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /dev/null no_verification 991s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /dev/null no_verification 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_ring=/dev/null 991s + local verify_option=no_verification 991s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_cn 991s + local key_name 991s + local tokens_dir 991s + local output_cert_file 991s + token_name= 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 991s + key_name=test-root-CA-trusted-certificate-0001 991s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s ++ sed -n 's/ *commonName *= //p' 991s + key_cn='Test Organization Root Trusted Certificate 0001' 991s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 991s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s Test Organization Root Tr Token 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 991s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 991s + token_name='Test Organization Root Tr Token' 991s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 991s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 991s + echo 'Test Organization Root Tr Token' 991s + '[' -n no_verification ']' 991s + local verify_arg=--verify=no_verification 991s + local output_base_name=SSSD-child-29288 991s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.pem 991s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 991s [p11_child[1994]] [main] (0x0400): p11_child started. 991s [p11_child[1994]] [main] (0x2000): Running in [pre-auth] mode. 991s [p11_child[1994]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[1994]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[1994]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 991s [p11_child[1994]] [do_card] (0x4000): Module List: 991s [p11_child[1994]] [do_card] (0x4000): common name: [softhsm2]. 991s [p11_child[1994]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[1994]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 991s [p11_child[1994]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 991s [p11_child[1994]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[1994]] [do_card] (0x4000): Login NOT required. 991s [p11_child[1994]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 991s [p11_child[1994]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 991s [p11_child[1994]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 991s [p11_child[1994]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 991s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.output 991s + echo '-----BEGIN CERTIFICATE-----' 991s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.output 991s + echo '-----END CERTIFICATE-----' 991s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.pem 991s Certificate: 991s Data: 991s Version: 3 (0x2) 991s Serial Number: 3 (0x3) 991s Signature Algorithm: sha256WithRSAEncryption 991s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 991s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 991s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 991s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 991s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 991s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 991s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 991s a7:43 991s + local found_md5 expected_md5 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + expected_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288.pem 991s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 991s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.output 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.output .output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.pem 991s + echo -n 053350 991s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 991s [p11_child[2002]] [main] (0x0400): p11_child started. 991s [p11_child[2002]] [main] (0x2000): Running in [auth] mode. 991s [p11_child[2002]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[2002]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[2002]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 991s [p11_child[2002]] [do_card] (0x4000): Module List: 991s [p11_child[2002]] [do_card] (0x4000): common name: [softhsm2]. 991s [p11_child[2002]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2002]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 991s [p11_child[2002]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 991s [p11_child[2002]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2002]] [do_card] (0x4000): Login required. 991s [p11_child[2002]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 991s [p11_child[2002]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 991s [p11_child[2002]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 991s [p11_child[2002]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 991s [p11_child[2002]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 991s [p11_child[2002]] [do_card] (0x4000): Certificate verified and validated. 991s [p11_child[2002]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 991s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.output 991s + echo '-----BEGIN CERTIFICATE-----' 991s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.output 991s + echo '-----END CERTIFICATE-----' 991s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.pem 991s Certificate: 991s Data: 991s Version: 3 (0x2) 991s Serial Number: 3 (0x3) 991s Signature Algorithm: sha256WithRSAEncryption 991s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 991s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 991s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 991s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 991s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 991s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 991s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 991s a7:43 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-29288-auth.pem 991s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 991s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s + local verify_option= 991s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_cn 991s + local key_name 991s + local tokens_dir 991s + local output_cert_file 991s + token_name= 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 991s + key_name=test-root-CA-trusted-certificate-0001 991s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s ++ sed -n 's/ *commonName *= //p' 991s + key_cn='Test Organization Root Trusted Certificate 0001' 991s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 991s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 991s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 991s + token_name='Test Organization Root Tr Token' 991s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 991s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 991s + echo 'Test Organization Root Tr Token' 991s + '[' -n '' ']' 991s + local output_base_name=SSSD-child-18910 991s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.pem 991s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s Test Organization Root Tr Token 991s [p11_child[2012]] [main] (0x0400): p11_child started. 991s [p11_child[2012]] [main] (0x2000): Running in [pre-auth] mode. 991s [p11_child[2012]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[2012]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[2012]] [do_card] (0x4000): Module List: 991s [p11_child[2012]] [do_card] (0x4000): common name: [softhsm2]. 991s [p11_child[2012]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2012]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 991s [p11_child[2012]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 991s [p11_child[2012]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2012]] [do_card] (0x4000): Login NOT required. 991s [p11_child[2012]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 991s [p11_child[2012]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 991s [p11_child[2012]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 991s [p11_child[2012]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 991s [p11_child[2012]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 991s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.output 991s + echo '-----BEGIN CERTIFICATE-----' 991s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.output 991s + echo '-----END CERTIFICATE-----' 991s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.pem 991s Certificate: 991s Data: 991s Version: 3 (0x2) 991s Serial Number: 3 (0x3) 991s Signature Algorithm: sha256WithRSAEncryption 991s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 991s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 991s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 991s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 991s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 991s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 991s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 991s a7:43 991s + local found_md5 expected_md5 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + expected_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910.pem 991s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 991s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.output 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.output .output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.pem 991s + echo -n 053350 991s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 991s [p11_child[2020]] [main] (0x0400): p11_child started. 991s [p11_child[2020]] [main] (0x2000): Running in [auth] mode. 991s [p11_child[2020]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[2020]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[2020]] [do_card] (0x4000): Module List: 991s [p11_child[2020]] [do_card] (0x4000): common name: [softhsm2]. 991s [p11_child[2020]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2020]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 991s [p11_child[2020]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 991s [p11_child[2020]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2020]] [do_card] (0x4000): Login required. 991s [p11_child[2020]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 991s [p11_child[2020]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 991s [p11_child[2020]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 991s [p11_child[2020]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 991s [p11_child[2020]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 991s [p11_child[2020]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 991s [p11_child[2020]] [do_card] (0x4000): Certificate verified and validated. 991s [p11_child[2020]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 991s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.output 991s + echo '-----BEGIN CERTIFICATE-----' 991s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.output 991s + echo '-----END CERTIFICATE-----' 991s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.pem 991s Certificate: 991s Data: 991s Version: 3 (0x2) 991s Serial Number: 3 (0x3) 991s Signature Algorithm: sha256WithRSAEncryption 991s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 991s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 991s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 991s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 991s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 991s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 991s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 991s a7:43 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-18910-auth.pem 991s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 991s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 991s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 991s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s + local verify_option=partial_chain 991s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 991s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 991s + local key_cn 991s + local key_name 991s + local tokens_dir 991s + local output_cert_file 991s + token_name= 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 991s + key_name=test-root-CA-trusted-certificate-0001 991s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 991s ++ sed -n 's/ *commonName *= //p' 991s Test Organization Root Tr Token 991s + key_cn='Test Organization Root Trusted Certificate 0001' 991s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 991s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 991s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 991s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 991s + token_name='Test Organization Root Tr Token' 991s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 991s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 991s + echo 'Test Organization Root Tr Token' 991s + '[' -n partial_chain ']' 991s + local verify_arg=--verify=partial_chain 991s + local output_base_name=SSSD-child-1901 991s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.output 991s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.pem 991s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 991s [p11_child[2030]] [main] (0x0400): p11_child started. 991s [p11_child[2030]] [main] (0x2000): Running in [pre-auth] mode. 991s [p11_child[2030]] [main] (0x2000): Running with effective IDs: [0][0]. 991s [p11_child[2030]] [main] (0x2000): Running with real IDs [0][0]. 991s [p11_child[2030]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 991s [p11_child[2030]] [do_card] (0x4000): Module List: 991s [p11_child[2030]] [do_card] (0x4000): common name: [softhsm2]. 991s [p11_child[2030]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2030]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 991s [p11_child[2030]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 991s [p11_child[2030]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 991s [p11_child[2030]] [do_card] (0x4000): Login NOT required. 991s [p11_child[2030]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 991s [p11_child[2030]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 991s [p11_child[2030]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 991s [p11_child[2030]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 991s [p11_child[2030]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 991s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.output 991s + echo '-----BEGIN CERTIFICATE-----' 991s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.output 991s + echo '-----END CERTIFICATE-----' 991s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.pem 991s + local found_md5 expected_md5 991s Certificate: 991s Data: 991s Version: 3 (0x2) 991s Serial Number: 3 (0x3) 991s Signature Algorithm: sha256WithRSAEncryption 991s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 991s Validity 991s Not Before: Mar 4 23:32:25 2024 GMT 991s Not After : Mar 4 23:32:25 2025 GMT 991s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 991s Subject Public Key Info: 991s Public Key Algorithm: rsaEncryption 991s Public-Key: (1024 bit) 991s Modulus: 991s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 991s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 991s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 991s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 991s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 991s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 991s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 991s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 991s 9a:fa:c7:a8:07:ef:43:64:23 991s Exponent: 65537 (0x10001) 991s X509v3 extensions: 991s X509v3 Authority Key Identifier: 991s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 991s X509v3 Basic Constraints: 991s CA:FALSE 991s Netscape Cert Type: 991s SSL Client, S/MIME 991s Netscape Comment: 991s Test Organization Root CA trusted Certificate 991s X509v3 Subject Key Identifier: 991s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 991s X509v3 Key Usage: critical 991s Digital Signature, Non Repudiation, Key Encipherment 991s X509v3 Extended Key Usage: 991s TLS Web Client Authentication, E-mail Protection 991s X509v3 Subject Alternative Name: 991s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 991s Signature Algorithm: sha256WithRSAEncryption 991s Signature Value: 991s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 991s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 991s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 991s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 991s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 991s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 991s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 991s a7:43 991s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + expected_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.output 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.output .output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.pem 992s + echo -n 053350 992s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 992s [p11_child[2038]] [main] (0x0400): p11_child started. 992s [p11_child[2038]] [main] (0x2000): Running in [auth] mode. 992s [p11_child[2038]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2038]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2038]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 992s [p11_child[2038]] [do_card] (0x4000): Module List: 992s [p11_child[2038]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2038]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2038]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2038]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2038]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2038]] [do_card] (0x4000): Login required. 992s [p11_child[2038]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2038]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 992s [p11_child[2038]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2038]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 992s [p11_child[2038]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 992s [p11_child[2038]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 992s [p11_child[2038]] [do_card] (0x4000): Certificate verified and validated. 992s [p11_child[2038]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 3 (0x3) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 992s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 992s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 992s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 992s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 992s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 992s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 992s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 992s 9a:fa:c7:a8:07:ef:43:64:23 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Root CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 992s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 992s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 992s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 992s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 992s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 992s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 992s a7:43 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-1901-auth.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s + local verify_option= 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-root-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Root Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 992s + token_name='Test Organization Root Tr Token' 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 992s Test Organization Root Tr Token 992s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 992s + echo 'Test Organization Root Tr Token' 992s + '[' -n '' ']' 992s + local output_base_name=SSSD-child-28217 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s [p11_child[2048]] [main] (0x0400): p11_child started. 992s [p11_child[2048]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2048]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2048]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2048]] [do_card] (0x4000): Module List: 992s [p11_child[2048]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2048]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2048]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2048]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2048]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2048]] [do_card] (0x4000): Login NOT required. 992s [p11_child[2048]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2048]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 992s [p11_child[2048]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2048]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2048]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 3 (0x3) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 992s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 992s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 992s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 992s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 992s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 992s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 992s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 992s 9a:fa:c7:a8:07:ef:43:64:23 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Root CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 992s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 992s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 992s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 992s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 992s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 992s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 992s a7:43 992s + local found_md5 expected_md5 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + expected_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.output 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.output .output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.pem 992s + echo -n 053350 992s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 992s [p11_child[2056]] [main] (0x0400): p11_child started. 992s [p11_child[2056]] [main] (0x2000): Running in [auth] mode. 992s [p11_child[2056]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2056]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2056]] [do_card] (0x4000): Module List: 992s [p11_child[2056]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2056]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2056]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2056]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2056]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2056]] [do_card] (0x4000): Login required. 992s [p11_child[2056]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2056]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 992s [p11_child[2056]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2056]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 992s [p11_child[2056]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 992s [p11_child[2056]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 992s [p11_child[2056]] [do_card] (0x4000): Certificate verified and validated. 992s [p11_child[2056]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 3 (0x3) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 992s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 992s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 992s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 992s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 992s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 992s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 992s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 992s 9a:fa:c7:a8:07:ef:43:64:23 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Root CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 992s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 992s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 992s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 992s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 992s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 992s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 992s a7:43 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-28217-auth.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s + local verify_option=partial_chain 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-root-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Root Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 992s + token_name='Test Organization Root Tr Token' 992s Test Organization Root Tr Token 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 992s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 992s + echo 'Test Organization Root Tr Token' 992s + '[' -n partial_chain ']' 992s + local verify_arg=--verify=partial_chain 992s + local output_base_name=SSSD-child-23499 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 992s [p11_child[2066]] [main] (0x0400): p11_child started. 992s [p11_child[2066]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2066]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2066]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2066]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 992s [p11_child[2066]] [do_card] (0x4000): Module List: 992s [p11_child[2066]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2066]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2066]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2066]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2066]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2066]] [do_card] (0x4000): Login NOT required. 992s [p11_child[2066]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2066]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 992s [p11_child[2066]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2066]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2066]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 3 (0x3) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 992s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 992s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 992s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 992s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 992s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 992s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 992s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 992s 9a:fa:c7:a8:07:ef:43:64:23 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Root CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 992s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 992s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 992s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 992s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 992s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 992s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 992s a7:43 992s + local found_md5 expected_md5 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + expected_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.output 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.output .output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.pem 992s + echo -n 053350 992s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 992s [p11_child[2074]] [main] (0x0400): p11_child started. 992s [p11_child[2074]] [main] (0x2000): Running in [auth] mode. 992s [p11_child[2074]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2074]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2074]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 992s [p11_child[2074]] [do_card] (0x4000): Module List: 992s [p11_child[2074]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2074]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2074]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2074]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2074]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2074]] [do_card] (0x4000): Login required. 992s [p11_child[2074]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2074]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 992s [p11_child[2074]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2074]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x799dbdbb;slot-manufacturer=SoftHSM%20project;slot-id=2040380859;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=31464a0bf99dbdbb;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 992s [p11_child[2074]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 992s [p11_child[2074]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 992s [p11_child[2074]] [do_card] (0x4000): Certificate verified and validated. 992s [p11_child[2074]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 3 (0x3) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:d3:e6:0c:29:c2:4a:ca:30:ae:f3:e8:46:04:60: 992s 7b:0c:69:4f:a6:c8:aa:8d:c4:ff:78:94:e4:d5:b3: 992s 5e:a5:9e:41:4a:56:85:9a:81:47:5c:db:fd:cb:dd: 992s 4b:ec:b5:7b:91:08:42:c1:68:dc:dc:b7:28:23:42: 992s 80:98:4b:a6:98:58:52:fa:55:09:e8:75:ad:72:c5: 992s 4d:2f:97:2b:f1:7d:45:db:d2:e5:f1:17:95:12:d1: 992s 91:8b:4b:3c:ec:7d:8a:7e:cd:c7:70:02:e4:6d:3f: 992s 65:26:0a:aa:0d:be:e2:27:7d:51:ac:c8:e6:ae:e3: 992s 9a:fa:c7:a8:07:ef:43:64:23 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s 88:4E:C8:B7:75:DA:7E:95:6D:01:81:B6:17:79:7A:3F:FD:AC:F6:1A 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Root CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s B3:B1:02:2C:A0:DA:F4:40:EF:EE:55:3F:2F:4C:ED:29:D6:4F:E5:1D 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 30:36:3c:47:de:60:79:fe:12:1d:a3:24:7d:44:2c:4c:86:a1: 992s 4d:20:d0:b9:9e:8b:8c:43:a5:88:70:0c:68:20:30:0c:50:ef: 992s 0f:67:a5:85:d0:35:e8:1b:f9:6f:b4:72:a7:51:c7:75:df:4d: 992s 65:e3:18:17:95:36:c3:e1:90:1e:16:23:59:c3:81:de:3b:61: 992s 9a:49:7d:d1:87:7a:b3:89:15:1c:16:9c:44:a3:1e:e2:05:e1: 992s 53:15:32:ce:f4:70:97:c5:93:d6:c5:7f:9f:9a:a8:97:90:41: 992s bf:75:e9:e0:c4:ed:dd:77:99:b5:af:8a:c7:38:e6:82:24:ff: 992s a7:43 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-23499-auth.pem 992s + found_md5=Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 992s + '[' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 '!=' Modulus=D3E60C29C24ACA30AEF3E84604607B0C694FA6C8AA8DC4FF7894E4D5B35EA59E414A56859A81475CDBFDCBDD4BECB57B910842C168DCDCB728234280984BA6985852FA5509E875AD72C54D2F972BF17D45DBD2E5F1179512D1918B4B3CEC7D8A7ECDC77002E46D3F65260AAA0DBEE2277D51ACC8E6AEE39AFAC7A807EF436423 ']' 992s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s + local verify_option= 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-root-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Root Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 992s Test Organization Root Tr Token 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 992s + token_name='Test Organization Root Tr Token' 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 992s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 992s + echo 'Test Organization Root Tr Token' 992s + '[' -n '' ']' 992s + local output_base_name=SSSD-child-2347 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-2347.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-2347.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s [p11_child[2084]] [main] (0x0400): p11_child started. 992s [p11_child[2084]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2084]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2084]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2084]] [do_card] (0x4000): Module List: 992s [p11_child[2084]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2084]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2084]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2084]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2084]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2084]] [do_card] (0x4000): Login NOT required. 992s [p11_child[2084]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2084]] [do_verification] (0x0040): X509_verify_cert failed [0]. 992s [p11_child[2084]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 992s [p11_child[2084]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 992s [p11_child[2084]] [do_card] (0x4000): No certificate found. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-2347.output 992s + return 2 992s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem partial_chain 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem partial_chain 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s + local verify_option=partial_chain 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-28359 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-root-ca-trusted-cert-0001-28359 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-root-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-root-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Root Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 992s + token_name='Test Organization Root Tr Token' 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 992s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-root-CA-trusted-certificate-0001 ']' 992s + echo 'Test Organization Root Tr Token' 992s + '[' -n partial_chain ']' 992s + local verify_arg=--verify=partial_chain 992s + local output_base_name=SSSD-child-8246 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-8246.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-8246.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 992s Test Organization Root Tr Token 992s [p11_child[2091]] [main] (0x0400): p11_child started. 992s [p11_child[2091]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2091]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2091]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2091]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 992s [p11_child[2091]] [do_card] (0x4000): Module List: 992s [p11_child[2091]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2091]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2091]] [do_card] (0x4000): Description [SoftHSM slot ID 0x799dbdbb] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2091]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 992s [p11_child[2091]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x799dbdbb][2040380859] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2091]] [do_card] (0x4000): Login NOT required. 992s [p11_child[2091]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 992s [p11_child[2091]] [do_verification] (0x0040): X509_verify_cert failed [0]. 992s [p11_child[2091]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 992s [p11_child[2091]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 992s [p11_child[2091]] [do_card] (0x4000): No certificate found. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-8246.output 992s + return 2 992s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /dev/null 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /dev/null 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_ring=/dev/null 992s + local verify_option= 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-intermediate-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 992s + token_name='Test Organization Interme Token' 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 992s + local key_file 992s + local decrypted_key 992s + mkdir -p /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 992s + key_file=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key.pem 992s + decrypted_key=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 992s + cat 992s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 992s Slot 0 has a free/uninitialized token. 992s The token has been initialized and is reassigned to slot 1324439716 992s + softhsm2-util --show-slots 992s Available slots: 992s Slot 1324439716 992s Slot info: 992s Description: SoftHSM slot ID 0x4ef158a4 992s Manufacturer ID: SoftHSM project 992s Hardware version: 2.6 992s Firmware version: 2.6 992s Token present: yes 992s Token info: 992s Manufacturer ID: SoftHSM project 992s Model: SoftHSM v2 992s Hardware version: 2.6 992s Firmware version: 2.6 992s Serial number: 48c5a09b4ef158a4 992s Initialized: yes 992s User PIN init.: yes 992s Label: Test Organization Interme Token 992s Slot 1 992s Slot info: 992s Description: SoftHSM slot ID 0x1 992s Manufacturer ID: SoftHSM project 992s Hardware version: 2.6 992s Firmware version: 2.6 992s Token present: yes 992s Token info: 992s Manufacturer ID: SoftHSM project 992s Model: SoftHSM v2 992s Hardware version: 2.6 992s Firmware version: 2.6 992s Serial number: 992s Initialized: no 992s User PIN init.: no 992s Label: 992s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 992s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-6046 -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 992s writing RSA key 992s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 992s + rm /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 992s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 992s Object 0: 992s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 992s Type: X.509 Certificate (RSA-1024) 992s Expires: Tue Mar 4 23:32:25 2025 992s Label: Test Organization Intermediate Trusted Certificate 0001 992s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 992s 992s + echo 'Test Organization Interme Token' 992s + '[' -n '' ']' 992s + local output_base_name=SSSD-child-13107 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-13107.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-13107.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 992s Test Organization Interme Token 992s [p11_child[2107]] [main] (0x0400): p11_child started. 992s [p11_child[2107]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2107]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2107]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2107]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 992s [p11_child[2107]] [do_work] (0x0040): init_verification failed. 992s [p11_child[2107]] [main] (0x0020): p11_child failed (5) 992s + return 2 992s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /dev/null no_verification 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /dev/null no_verification 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_ring=/dev/null 992s + local verify_option=no_verification 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-intermediate-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 992s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 992s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 992s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 992s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 992s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 992s + token_name='Test Organization Interme Token' 992s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 992s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 992s + echo 'Test Organization Interme Token' 992s + '[' -n no_verification ']' 992s + local verify_arg=--verify=no_verification 992s + local output_base_name=SSSD-child-9883 992s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.pem 992s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 992s Test Organization Interme Token 992s [p11_child[2113]] [main] (0x0400): p11_child started. 992s [p11_child[2113]] [main] (0x2000): Running in [pre-auth] mode. 992s [p11_child[2113]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2113]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2113]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 992s [p11_child[2113]] [do_card] (0x4000): Module List: 992s [p11_child[2113]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2113]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2113]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2113]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 992s [p11_child[2113]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2113]] [do_card] (0x4000): Login NOT required. 992s [p11_child[2113]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 992s [p11_child[2113]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2113]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2113]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 4 (0x4) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 992s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 992s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 992s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 992s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 992s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 992s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 992s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 992s 52:ea:21:18:d3:05:2c:ef:cf 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Intermediate CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 992s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 992s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 992s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 992s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 992s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 992s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 992s 1c:a4 992s + local found_md5 expected_md5 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + expected_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883.pem 992s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 992s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 992s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.output 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.output .output 992s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.pem 992s + echo -n 053350 992s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 992s [p11_child[2121]] [main] (0x0400): p11_child started. 992s [p11_child[2121]] [main] (0x2000): Running in [auth] mode. 992s [p11_child[2121]] [main] (0x2000): Running with effective IDs: [0][0]. 992s [p11_child[2121]] [main] (0x2000): Running with real IDs [0][0]. 992s [p11_child[2121]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 992s [p11_child[2121]] [do_card] (0x4000): Module List: 992s [p11_child[2121]] [do_card] (0x4000): common name: [softhsm2]. 992s [p11_child[2121]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2121]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 992s [p11_child[2121]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 992s [p11_child[2121]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 992s [p11_child[2121]] [do_card] (0x4000): Login required. 992s [p11_child[2121]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 992s [p11_child[2121]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 992s [p11_child[2121]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 992s [p11_child[2121]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 992s [p11_child[2121]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 992s [p11_child[2121]] [do_card] (0x4000): Certificate verified and validated. 992s [p11_child[2121]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 992s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.output 992s + echo '-----BEGIN CERTIFICATE-----' 992s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.output 992s + echo '-----END CERTIFICATE-----' 992s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.pem 992s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-9883-auth.pem 992s Certificate: 992s Data: 992s Version: 3 (0x2) 992s Serial Number: 4 (0x4) 992s Signature Algorithm: sha256WithRSAEncryption 992s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 992s Validity 992s Not Before: Mar 4 23:32:25 2024 GMT 992s Not After : Mar 4 23:32:25 2025 GMT 992s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 992s Subject Public Key Info: 992s Public Key Algorithm: rsaEncryption 992s Public-Key: (1024 bit) 992s Modulus: 992s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 992s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 992s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 992s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 992s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 992s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 992s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 992s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 992s 52:ea:21:18:d3:05:2c:ef:cf 992s Exponent: 65537 (0x10001) 992s X509v3 extensions: 992s X509v3 Authority Key Identifier: 992s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 992s X509v3 Basic Constraints: 992s CA:FALSE 992s Netscape Cert Type: 992s SSL Client, S/MIME 992s Netscape Comment: 992s Test Organization Intermediate CA trusted Certificate 992s X509v3 Subject Key Identifier: 992s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 992s X509v3 Key Usage: critical 992s Digital Signature, Non Repudiation, Key Encipherment 992s X509v3 Extended Key Usage: 992s TLS Web Client Authentication, E-mail Protection 992s X509v3 Subject Alternative Name: 992s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 992s Signature Algorithm: sha256WithRSAEncryption 992s Signature Value: 992s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 992s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 992s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 992s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 992s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 992s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 992s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 992s 1c:a4 992s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 992s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 992s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 992s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 992s + local verify_option= 992s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 992s + local key_cn 992s + local key_name 992s + local tokens_dir 992s + local output_cert_file 992s + token_name= 992s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 992s + key_name=test-intermediate-CA-trusted-certificate-0001 992s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 992s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n '' ']' 993s + local output_base_name=SSSD-child-24612 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24612.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24612.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s Test Organization Interme Token 993s [p11_child[2131]] [main] (0x0400): p11_child started. 993s [p11_child[2131]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2131]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2131]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2131]] [do_card] (0x4000): Module List: 993s [p11_child[2131]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2131]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2131]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2131]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2131]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2131]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2131]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2131]] [do_verification] (0x0040): X509_verify_cert failed [0]. 993s [p11_child[2131]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 993s [p11_child[2131]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 993s [p11_child[2131]] [do_card] (0x4000): No certificate found. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-24612.output 993s + return 2 993s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s + local verify_option=partial_chain 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n partial_chain ']' 993s + local verify_arg=--verify=partial_chain 993s + local output_base_name=SSSD-child-7454 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7454.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7454.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s Test Organization Interme Token 993s [p11_child[2138]] [main] (0x0400): p11_child started. 993s [p11_child[2138]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2138]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2138]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2138]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2138]] [do_card] (0x4000): Module List: 993s [p11_child[2138]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2138]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2138]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2138]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2138]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2138]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2138]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2138]] [do_verification] (0x0040): X509_verify_cert failed [0]. 993s [p11_child[2138]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 993s [p11_child[2138]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 993s [p11_child[2138]] [do_card] (0x4000): No certificate found. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7454.output 993s + return 2 993s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + local verify_option= 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n '' ']' 993s + local output_base_name=SSSD-child-6141 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.pem 993s Test Organization Interme Token 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s [p11_child[2145]] [main] (0x0400): p11_child started. 993s [p11_child[2145]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2145]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2145]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2145]] [do_card] (0x4000): Module List: 993s [p11_child[2145]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2145]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2145]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2145]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2145]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2145]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2145]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2145]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2145]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2145]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2145]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.pem 993s + local found_md5 expected_md5 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s + expected_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.output 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.output .output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.pem 993s + echo -n 053350 993s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 993s [p11_child[2153]] [main] (0x0400): p11_child started. 993s [p11_child[2153]] [main] (0x2000): Running in [auth] mode. 993s [p11_child[2153]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2153]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2153]] [do_card] (0x4000): Module List: 993s [p11_child[2153]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2153]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2153]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2153]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2153]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2153]] [do_card] (0x4000): Login required. 993s [p11_child[2153]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2153]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2153]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2153]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 993s [p11_child[2153]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 993s [p11_child[2153]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 993s [p11_child[2153]] [do_card] (0x4000): Certificate verified and validated. 993s [p11_child[2153]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-6141-auth.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + local verify_option=partial_chain 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n partial_chain ']' 993s + local verify_arg=--verify=partial_chain 993s + local output_base_name=SSSD-child-27861 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s Test Organization Interme Token 993s [p11_child[2163]] [main] (0x0400): p11_child started. 993s [p11_child[2163]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2163]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2163]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2163]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2163]] [do_card] (0x4000): Module List: 993s [p11_child[2163]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2163]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2163]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2163]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2163]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2163]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2163]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2163]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2163]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2163]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2163]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s + local found_md5 expected_md5 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + expected_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.output 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.output .output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.pem 993s + echo -n 053350 993s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 993s [p11_child[2171]] [main] (0x0400): p11_child started. 993s [p11_child[2171]] [main] (0x2000): Running in [auth] mode. 993s [p11_child[2171]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2171]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2171]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2171]] [do_card] (0x4000): Module List: 993s [p11_child[2171]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2171]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2171]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2171]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2171]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2171]] [do_card] (0x4000): Login required. 993s [p11_child[2171]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2171]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2171]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2171]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 993s [p11_child[2171]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 993s [p11_child[2171]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 993s [p11_child[2171]] [do_card] (0x4000): Certificate verified and validated. 993s [p11_child[2171]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-27861-auth.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s + local verify_option= 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n '' ']' 993s + local output_base_name=SSSD-child-26580 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-26580.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-26580.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s Test Organization Interme Token 993s [p11_child[2181]] [main] (0x0400): p11_child started. 993s [p11_child[2181]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2181]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2181]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2181]] [do_card] (0x4000): Module List: 993s [p11_child[2181]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2181]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2181]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2181]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2181]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2181]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2181]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2181]] [do_verification] (0x0040): X509_verify_cert failed [0]. 993s [p11_child[2181]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 993s [p11_child[2181]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 993s [p11_child[2181]] [do_card] (0x4000): No certificate found. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-26580.output 993s + return 2 993s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem partial_chain 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem partial_chain 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s + local verify_option=partial_chain 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-6046 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Interme Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Interme Token' 993s + '[' -n partial_chain ']' 993s + local verify_arg=--verify=partial_chain 993s + local output_base_name=SSSD-child-11962 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem 993s Test Organization Interme Token 993s [p11_child[2188]] [main] (0x0400): p11_child started. 993s [p11_child[2188]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2188]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2188]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2188]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2188]] [do_card] (0x4000): Module List: 993s [p11_child[2188]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2188]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2188]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2188]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2188]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2188]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2188]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2188]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2188]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2188]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2188]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s + local found_md5 expected_md5 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA-trusted-certificate-0001.pem 993s + expected_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.output 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.output .output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.pem 993s + echo -n 053350 993s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 993s [p11_child[2196]] [main] (0x0400): p11_child started. 993s [p11_child[2196]] [main] (0x2000): Running in [auth] mode. 993s [p11_child[2196]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2196]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2196]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2196]] [do_card] (0x4000): Module List: 993s [p11_child[2196]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2196]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2196]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ef158a4] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2196]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 993s [p11_child[2196]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x4ef158a4][1324439716] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2196]] [do_card] (0x4000): Login required. 993s [p11_child[2196]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 993s [p11_child[2196]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2196]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2196]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ef158a4;slot-manufacturer=SoftHSM%20project;slot-id=1324439716;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=48c5a09b4ef158a4;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 993s [p11_child[2196]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 993s [p11_child[2196]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 993s [p11_child[2196]] [do_card] (0x4000): Certificate verified and validated. 993s [p11_child[2196]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.pem 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 4 (0x4) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:95:57:f7:13:11:8d:12:b9:8b:04:3a:7c:35:70: 993s 27:8e:48:9e:1e:ee:b4:24:e3:56:4d:56:63:d0:99: 993s 21:a3:02:3a:26:f1:bf:57:5f:c0:1b:5a:2c:8c:e9: 993s b1:cb:4a:7b:df:57:ff:3a:bd:a4:ac:cd:b7:65:11: 993s c2:3a:0d:c5:6a:20:df:f6:77:d9:6c:72:6d:52:a1: 993s 14:bf:36:a5:74:bc:55:a8:38:1b:0f:96:7f:87:f0: 993s c5:9b:61:29:bc:b3:77:db:5e:c3:1d:bf:85:bb:9a: 993s d7:b5:14:dd:e5:b7:10:0f:d4:ee:8d:5b:91:9a:9b: 993s 52:ea:21:18:d3:05:2c:ef:cf 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s E2:42:AB:72:8F:62:2D:97:F9:05:21:8B:9A:FF:CD:EE:BE:C1:FB:C5 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 86:15:2C:1A:0C:52:01:FF:06:87:D8:63:8E:DC:37:41:00:27:0E:01 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 94:5e:5f:98:c0:e3:ae:f8:e7:6f:3d:6d:b2:aa:c8:b6:e8:89: 993s 5a:7d:48:74:75:7e:62:b8:d9:d2:72:c3:66:3c:ac:3f:b2:5a: 993s f1:5b:03:6f:f1:2f:3a:92:ea:b7:c0:d7:e2:39:46:94:85:2e: 993s 83:62:f2:09:75:29:c9:ec:0c:21:70:3d:ad:75:c4:90:b5:62: 993s 7e:8b:a7:76:64:80:32:e6:00:34:b8:56:53:74:fe:1b:bd:b7: 993s 21:3d:26:3f:8b:62:51:b5:d1:f0:40:43:f7:d7:5b:b6:22:ce: 993s 0f:7b:77:d6:a7:32:4d:31:5b:a1:bc:5d:e4:c8:9c:c4:b8:df: 993s 1c:a4 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-11962-auth.pem 993s + found_md5=Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF 993s + '[' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF '!=' Modulus=9557F713118D12B98B043A7C3570278E489E1EEEB424E3564D5663D09921A3023A26F1BF575FC01B5A2C8CE9B1CB4A7BDF57FF3ABDA4ACCDB76511C23A0DC56A20DFF677D96C726D52A114BF36A574BC55A8381B0F967F87F0C59B6129BCB377DB5EC31DBF85BB9AD7B514DDE5B7100FD4EE8D5B919A9B52EA2118D3052CEFCF ']' 993s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s + local verify_option= 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Sub Int Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 993s + local key_file 993s + local decrypted_key 993s + mkdir -p /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 993s + key_file=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 993s + decrypted_key=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 993s + cat 993s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 993s Slot 0 has a free/uninitialized token. 993s The token has been initialized and is reassigned to slot 1256681052 993s + softhsm2-util --show-slots 993s Available slots: 993s Slot 1256681052 993s Slot info: 993s Description: SoftHSM slot ID 0x4ae76e5c 993s Manufacturer ID: SoftHSM project 993s Hardware version: 2.6 993s Firmware version: 2.6 993s Token present: yes 993s Token info: 993s Manufacturer ID: SoftHSM project 993s Model: SoftHSM v2 993s Hardware version: 2.6 993s Firmware version: 2.6 993s Serial number: 1c4c5045cae76e5c 993s Initialized: yes 993s User PIN init.: yes 993s Label: Test Organization Sub Int Token 993s Slot 1 993s Slot info: 993s Description: SoftHSM slot ID 0x1 993s Manufacturer ID: SoftHSM project 993s Hardware version: 2.6 993s Firmware version: 2.6 993s Token present: yes 993s Token info: 993s Manufacturer ID: SoftHSM project 993s Model: SoftHSM v2 993s Hardware version: 2.6 993s Firmware version: 2.6 993s Serial number: 993s Initialized: no 993s User PIN init.: no 993s Label: 993s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 993s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-8057 -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 993s writing RSA key 993s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 993s + rm /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 993s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 993s Object 0: 993s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 993s Type: X.509 Certificate (RSA-1024) 993s Expires: Tue Mar 4 23:32:25 2025 993s Label: Test Organization Sub Intermediate Trusted Certificate 0001 993s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 993s 993s Test Organization Sub Int Token 993s + echo 'Test Organization Sub Int Token' 993s + '[' -n '' ']' 993s + local output_base_name=SSSD-child-15528 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-15528.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-15528.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s [p11_child[2215]] [main] (0x0400): p11_child started. 993s [p11_child[2215]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2215]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2215]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2215]] [do_card] (0x4000): Module List: 993s [p11_child[2215]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2215]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2215]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2215]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 993s [p11_child[2215]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2215]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2215]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 993s [p11_child[2215]] [do_verification] (0x0040): X509_verify_cert failed [0]. 993s [p11_child[2215]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 993s [p11_child[2215]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 993s [p11_child[2215]] [do_card] (0x4000): No certificate found. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-15528.output 993s + return 2 993s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem partial_chain 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s + local verify_option=partial_chain 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Sub Int Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Sub Int Token' 993s + '[' -n partial_chain ']' 993s + local verify_arg=--verify=partial_chain 993s + local output_base_name=SSSD-child-24594 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24594.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24594.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-CA.pem 993s Test Organization Sub Int Token 993s [p11_child[2222]] [main] (0x0400): p11_child started. 993s [p11_child[2222]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2222]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2222]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2222]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 993s [p11_child[2222]] [do_card] (0x4000): Module List: 993s [p11_child[2222]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2222]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2222]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2222]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 993s [p11_child[2222]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2222]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2222]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 993s [p11_child[2222]] [do_verification] (0x0040): X509_verify_cert failed [0]. 993s [p11_child[2222]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 993s [p11_child[2222]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 993s [p11_child[2222]] [do_card] (0x4000): No certificate found. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-24594.output 993s + return 2 993s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s + local verify_option= 993s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 993s + local key_cn 993s + local key_name 993s + local tokens_dir 993s + local output_cert_file 993s + token_name= 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 993s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 993s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 993s ++ sed -n 's/ *commonName *= //p' 993s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 993s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 993s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 993s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 993s Test Organization Sub Int Token 993s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 993s + token_name='Test Organization Sub Int Token' 993s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 993s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 993s + echo 'Test Organization Sub Int Token' 993s + '[' -n '' ']' 993s + local output_base_name=SSSD-child-20370 993s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.output 993s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.pem 993s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 993s [p11_child[2229]] [main] (0x0400): p11_child started. 993s [p11_child[2229]] [main] (0x2000): Running in [pre-auth] mode. 993s [p11_child[2229]] [main] (0x2000): Running with effective IDs: [0][0]. 993s [p11_child[2229]] [main] (0x2000): Running with real IDs [0][0]. 993s [p11_child[2229]] [do_card] (0x4000): Module List: 993s [p11_child[2229]] [do_card] (0x4000): common name: [softhsm2]. 993s [p11_child[2229]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2229]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 993s [p11_child[2229]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 993s [p11_child[2229]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 993s [p11_child[2229]] [do_card] (0x4000): Login NOT required. 993s [p11_child[2229]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 993s [p11_child[2229]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 993s [p11_child[2229]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 993s [p11_child[2229]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 993s [p11_child[2229]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 993s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.output 993s + echo '-----BEGIN CERTIFICATE-----' 993s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.output 993s + echo '-----END CERTIFICATE-----' 993s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.pem 993s + local found_md5 expected_md5 993s Certificate: 993s Data: 993s Version: 3 (0x2) 993s Serial Number: 5 (0x5) 993s Signature Algorithm: sha256WithRSAEncryption 993s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 993s Validity 993s Not Before: Mar 4 23:32:25 2024 GMT 993s Not After : Mar 4 23:32:25 2025 GMT 993s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 993s Subject Public Key Info: 993s Public Key Algorithm: rsaEncryption 993s Public-Key: (1024 bit) 993s Modulus: 993s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 993s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 993s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 993s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 993s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 993s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 993s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 993s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 993s 44:08:65:2a:58:59:f2:ba:19 993s Exponent: 65537 (0x10001) 993s X509v3 extensions: 993s X509v3 Authority Key Identifier: 993s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 993s X509v3 Basic Constraints: 993s CA:FALSE 993s Netscape Cert Type: 993s SSL Client, S/MIME 993s Netscape Comment: 993s Test Organization Sub Intermediate CA trusted Certificate 993s X509v3 Subject Key Identifier: 993s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 993s X509v3 Key Usage: critical 993s Digital Signature, Non Repudiation, Key Encipherment 993s X509v3 Extended Key Usage: 993s TLS Web Client Authentication, E-mail Protection 993s X509v3 Subject Alternative Name: 993s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 993s Signature Algorithm: sha256WithRSAEncryption 993s Signature Value: 993s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 993s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 993s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 993s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 993s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 993s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 993s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 993s 58:5d 993s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + expected_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.output 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.output .output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.pem 994s + echo -n 053350 994s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 994s [p11_child[2237]] [main] (0x0400): p11_child started. 994s [p11_child[2237]] [main] (0x2000): Running in [auth] mode. 994s [p11_child[2237]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2237]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2237]] [do_card] (0x4000): Module List: 994s [p11_child[2237]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2237]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2237]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2237]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2237]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2237]] [do_card] (0x4000): Login required. 994s [p11_child[2237]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2237]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2237]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2237]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 994s [p11_child[2237]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 994s [p11_child[2237]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 994s [p11_child[2237]] [do_card] (0x4000): Certificate verified and validated. 994s [p11_child[2237]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-20370-auth.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 994s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem partial_chain 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 994s + local verify_option=partial_chain 994s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_cn 994s + local key_name 994s + local tokens_dir 994s + local output_cert_file 994s + token_name= 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 994s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 994s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s ++ sed -n 's/ *commonName *= //p' 994s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 994s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 994s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 994s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 994s + token_name='Test Organization Sub Int Token' 994s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 994s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 994s + echo 'Test Organization Sub Int Token' 994s + '[' -n partial_chain ']' 994s + local verify_arg=--verify=partial_chain 994s + local output_base_name=SSSD-child-31758 994s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.pem 994s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem 994s Test Organization Sub Int Token 994s [p11_child[2247]] [main] (0x0400): p11_child started. 994s [p11_child[2247]] [main] (0x2000): Running in [pre-auth] mode. 994s [p11_child[2247]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2247]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2247]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2247]] [do_card] (0x4000): Module List: 994s [p11_child[2247]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2247]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2247]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2247]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2247]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2247]] [do_card] (0x4000): Login NOT required. 994s [p11_child[2247]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2247]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2247]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2247]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2247]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s + local found_md5 expected_md5 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + expected_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.output 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.output .output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.pem 994s + echo -n 053350 994s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 994s [p11_child[2255]] [main] (0x0400): p11_child started. 994s [p11_child[2255]] [main] (0x2000): Running in [auth] mode. 994s [p11_child[2255]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2255]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2255]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2255]] [do_card] (0x4000): Module List: 994s [p11_child[2255]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2255]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2255]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2255]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2255]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2255]] [do_card] (0x4000): Login required. 994s [p11_child[2255]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2255]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2255]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2255]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 994s [p11_child[2255]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 994s [p11_child[2255]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 994s [p11_child[2255]] [do_card] (0x4000): Certificate verified and validated. 994s [p11_child[2255]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-31758-auth.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s + local verify_option= 994s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_cn 994s + local key_name 994s + local tokens_dir 994s + local output_cert_file 994s + token_name= 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 994s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 994s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s ++ sed -n 's/ *commonName *= //p' 994s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 994s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 994s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 994s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 994s + token_name='Test Organization Sub Int Token' 994s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 994s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 994s + echo 'Test Organization Sub Int Token' 994s Test Organization Sub Int Token 994s + '[' -n '' ']' 994s + local output_base_name=SSSD-child-19701 994s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-19701.output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-19701.pem 994s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s [p11_child[2265]] [main] (0x0400): p11_child started. 994s [p11_child[2265]] [main] (0x2000): Running in [pre-auth] mode. 994s [p11_child[2265]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2265]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2265]] [do_card] (0x4000): Module List: 994s [p11_child[2265]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2265]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2265]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2265]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2265]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2265]] [do_card] (0x4000): Login NOT required. 994s [p11_child[2265]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2265]] [do_verification] (0x0040): X509_verify_cert failed [0]. 994s [p11_child[2265]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 994s [p11_child[2265]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 994s [p11_child[2265]] [do_card] (0x4000): No certificate found. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-19701.output 994s + return 2 994s + invalid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem partial_chain 994s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem partial_chain 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem 994s + local verify_option=partial_chain 994s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_cn 994s + local key_name 994s + local tokens_dir 994s + local output_cert_file 994s + token_name= 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 994s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 994s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s ++ sed -n 's/ *commonName *= //p' 994s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 994s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 994s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 994s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 994s + token_name='Test Organization Sub Int Token' 994s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 994s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 994s + echo 'Test Organization Sub Int Token' 994s + '[' -n partial_chain ']' 994s + local verify_arg=--verify=partial_chain 994s + local output_base_name=SSSD-child-24694 994s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24694.output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-24694.pem 994s Test Organization Sub Int Token 994s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-root-intermediate-chain-CA.pem 994s [p11_child[2272]] [main] (0x0400): p11_child started. 994s [p11_child[2272]] [main] (0x2000): Running in [pre-auth] mode. 994s [p11_child[2272]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2272]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2272]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2272]] [do_card] (0x4000): Module List: 994s [p11_child[2272]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2272]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2272]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2272]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2272]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2272]] [do_card] (0x4000): Login NOT required. 994s [p11_child[2272]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2272]] [do_verification] (0x0040): X509_verify_cert failed [0]. 994s [p11_child[2272]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 994s [p11_child[2272]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 994s [p11_child[2272]] [do_card] (0x4000): No certificate found. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-24694.output 994s + return 2 994s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem partial_chain 994s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem partial_chain 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s + local verify_option=partial_chain 994s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_cn 994s + local key_name 994s + local tokens_dir 994s + local output_cert_file 994s + token_name= 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 994s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 994s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s ++ sed -n 's/ *commonName *= //p' 994s Test Organization Sub Int Token 994s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 994s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 994s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 994s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 994s + token_name='Test Organization Sub Int Token' 994s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 994s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 994s + echo 'Test Organization Sub Int Token' 994s + '[' -n partial_chain ']' 994s + local verify_arg=--verify=partial_chain 994s + local output_base_name=SSSD-child-22948 994s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.pem 994s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem 994s [p11_child[2279]] [main] (0x0400): p11_child started. 994s [p11_child[2279]] [main] (0x2000): Running in [pre-auth] mode. 994s [p11_child[2279]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2279]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2279]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2279]] [do_card] (0x4000): Module List: 994s [p11_child[2279]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2279]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2279]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2279]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2279]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2279]] [do_card] (0x4000): Login NOT required. 994s [p11_child[2279]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2279]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2279]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2279]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2279]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s + local found_md5 expected_md5 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + expected_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.output 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.output .output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.pem 994s + echo -n 053350 994s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 994s [p11_child[2287]] [main] (0x0400): p11_child started. 994s [p11_child[2287]] [main] (0x2000): Running in [auth] mode. 994s [p11_child[2287]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2287]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2287]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2287]] [do_card] (0x4000): Module List: 994s [p11_child[2287]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2287]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2287]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2287]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2287]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2287]] [do_card] (0x4000): Login required. 994s [p11_child[2287]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2287]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2287]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2287]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 994s [p11_child[2287]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 994s [p11_child[2287]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 994s [p11_child[2287]] [do_card] (0x4000): Certificate verified and validated. 994s [p11_child[2287]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-22948-auth.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + valid_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-sub-chain-CA.pem partial_chain 994s + check_certificate /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 /tmp/sssd-softhsm2-8XEtt9/test-intermediate-sub-chain-CA.pem partial_chain 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_ring=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-sub-chain-CA.pem 994s + local verify_option=partial_chain 994s + prepare_softhsm2_card /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local certificate=/tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-8057 994s + local key_cn 994s + local key_name 994s + local tokens_dir 994s + local output_cert_file 994s + token_name= 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 994s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 994s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s ++ sed -n 's/ *commonName *= //p' 994s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 994s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 994s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 994s + tokens_dir=/tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 994s + token_name='Test Organization Sub Int Token' 994s + '[' '!' -e /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 994s + '[' '!' -d /tmp/sssd-softhsm2-8XEtt9/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 994s + echo 'Test Organization Sub Int Token' 994s + '[' -n partial_chain ']' 994s + local verify_arg=--verify=partial_chain 994s + local output_base_name=SSSD-child-7383 994s + local output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.pem 994s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-sub-chain-CA.pem 994s Test Organization Sub Int Token 994s [p11_child[2297]] [main] (0x0400): p11_child started. 994s [p11_child[2297]] [main] (0x2000): Running in [pre-auth] mode. 994s [p11_child[2297]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2297]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2297]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2297]] [do_card] (0x4000): Module List: 994s [p11_child[2297]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2297]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2297]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2297]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2297]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2297]] [do_card] (0x4000): Login NOT required. 994s [p11_child[2297]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2297]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2297]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2297]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2297]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s + local found_md5 expected_md5 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/test-sub-intermediate-CA-trusted-certificate-0001.pem 994s + expected_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + output_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.output 994s ++ basename /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.output .output 994s + output_cert_file=/tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.pem 994s + echo -n 053350 994s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-8XEtt9/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 994s [p11_child[2305]] [main] (0x0400): p11_child started. 994s [p11_child[2305]] [main] (0x2000): Running in [auth] mode. 994s [p11_child[2305]] [main] (0x2000): Running with effective IDs: [0][0]. 994s [p11_child[2305]] [main] (0x2000): Running with real IDs [0][0]. 994s [p11_child[2305]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 994s [p11_child[2305]] [do_card] (0x4000): Module List: 994s [p11_child[2305]] [do_card] (0x4000): common name: [softhsm2]. 994s [p11_child[2305]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2305]] [do_card] (0x4000): Description [SoftHSM slot ID 0x4ae76e5c] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 994s [p11_child[2305]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 994s [p11_child[2305]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x4ae76e5c][1256681052] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 994s [p11_child[2305]] [do_card] (0x4000): Login required. 994s [p11_child[2305]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 994s [p11_child[2305]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 994s [p11_child[2305]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 994s [p11_child[2305]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x4ae76e5c;slot-manufacturer=SoftHSM%20project;slot-id=1256681052;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1c4c5045cae76e5c;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 994s [p11_child[2305]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 994s [p11_child[2305]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 994s [p11_child[2305]] [do_card] (0x4000): Certificate verified and validated. 994s [p11_child[2305]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 994s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.output 994s + echo '-----BEGIN CERTIFICATE-----' 994s + tail -n1 /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.output 994s + echo '-----END CERTIFICATE-----' 994s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.pem 994s Certificate: 994s Data: 994s Version: 3 (0x2) 994s Serial Number: 5 (0x5) 994s Signature Algorithm: sha256WithRSAEncryption 994s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 994s Validity 994s Not Before: Mar 4 23:32:25 2024 GMT 994s Not After : Mar 4 23:32:25 2025 GMT 994s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 994s Subject Public Key Info: 994s Public Key Algorithm: rsaEncryption 994s Public-Key: (1024 bit) 994s Modulus: 994s 00:c7:0d:fb:67:94:64:a9:3f:3a:0c:fa:d5:64:6d: 994s 10:6a:bf:23:f1:b7:ae:47:91:aa:41:41:8f:10:c5: 994s ca:93:d0:bd:5c:6e:81:b5:04:a8:be:14:65:53:6b: 994s f6:91:a9:fc:26:72:09:38:ac:e0:98:22:2b:f0:b8: 994s be:1d:1f:d9:6a:1c:9e:b8:6e:d0:91:10:a0:60:26: 994s 27:6c:0d:44:84:ed:81:22:29:be:33:a5:e2:94:4c: 994s fa:f9:e1:53:8a:53:b9:9f:8d:35:44:83:0d:3a:24: 994s dc:96:e8:51:d8:9f:33:4e:30:3f:78:e6:a7:c3:a4: 994s 44:08:65:2a:58:59:f2:ba:19 994s Exponent: 65537 (0x10001) 994s X509v3 extensions: 994s X509v3 Authority Key Identifier: 994s 10:BC:5A:16:DC:41:C6:74:52:0C:A8:DF:FA:50:B0:98:04:C2:F1:35 994s X509v3 Basic Constraints: 994s CA:FALSE 994s Netscape Cert Type: 994s SSL Client, S/MIME 994s Netscape Comment: 994s Test Organization Sub Intermediate CA trusted Certificate 994s X509v3 Subject Key Identifier: 994s 32:E7:D9:64:91:0A:18:8E:0F:61:78:F7:11:DD:B6:38:C3:56:F1:43 994s X509v3 Key Usage: critical 994s Digital Signature, Non Repudiation, Key Encipherment 994s X509v3 Extended Key Usage: 994s TLS Web Client Authentication, E-mail Protection 994s X509v3 Subject Alternative Name: 994s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 994s Signature Algorithm: sha256WithRSAEncryption 994s Signature Value: 994s 72:02:e3:d4:e4:00:30:4e:79:34:33:50:4c:06:b9:25:05:e9: 994s 00:90:ad:d0:bb:70:f8:67:1c:cc:c3:e9:5c:62:42:68:1c:82: 994s ae:44:76:d5:15:0c:c7:6b:03:25:76:77:ce:73:fd:91:b4:45: 994s 47:bd:0e:3e:f5:8d:97:a8:88:38:2d:b2:2b:7e:4b:69:4d:56: 994s 17:94:72:e5:af:17:4a:6f:bc:4d:ea:8c:86:74:2c:92:a9:7f: 994s b7:cf:fb:e8:18:9d:bb:dd:fa:1b:26:f0:d5:97:90:a3:cd:df: 994s be:04:1d:dd:d3:6b:f5:ba:72:c4:6d:e9:b1:74:bf:c7:e8:fe: 994s 58:5d 994s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-8XEtt9/SSSD-child-7383-auth.pem 994s + found_md5=Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 994s 994s Test completed, Root CA and intermediate issued certificates verified! 994s + '[' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 '!=' Modulus=C70DFB679464A93F3A0CFAD5646D106ABF23F1B7AE4791AA41418F10C5CA93D0BD5C6E81B504A8BE1465536BF691A9FC26720938ACE098222BF0B8BE1D1FD96A1C9EB86ED09110A06026276C0D4484ED812229BE33A5E2944CFAF9E1538A53B99F8D3544830D3A24DC96E851D89F334E303F78E6A7C3A44408652A5859F2BA19 ']' 994s + set +x 995s autopkgtest [23:32:30]: test sssd-softhism2-certificates-tests.sh: -----------------------] 995s autopkgtest [23:32:30]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 995s sssd-softhism2-certificates-tests.sh PASS 995s autopkgtest [23:32:30]: test sssd-smart-card-pam-auth-configs: preparing testbed 997s Reading package lists... 998s Building dependency tree... 998s Reading state information... 998s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 998s Starting 2 pkgProblemResolver with broken count: 0 998s Done 998s Done 998s Starting pkgProblemResolver with broken count: 0 998s Starting 2 pkgProblemResolver with broken count: 0 998s Done 999s The following additional packages will be installed: 999s pamtester 999s The following NEW packages will be installed: 999s pamtester 999s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 999s 1 not fully installed or removed. 999s Need to get 12.7 kB of archives. 999s After this operation, 36.9 kB of additional disk space will be used. 999s Get:1 http://ftpmaster.internal/ubuntu noble/universe amd64 pamtester amd64 0.1.2-4 [12.7 kB] 999s Fetched 12.7 kB in 0s (610 kB/s) 999s Selecting previously unselected package pamtester. 999s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71956 files and directories currently installed.) 999s Preparing to unpack .../pamtester_0.1.2-4_amd64.deb ... 999s Unpacking pamtester (0.1.2-4) ... 999s Setting up pamtester (0.1.2-4) ... 999s Setting up autopkgtest-satdep (0) ... 999s Processing triggers for man-db (2.12.0-3) ... 1002s (Reading database ... 71962 files and directories currently installed.) 1002s Removing autopkgtest-satdep (0) ... 1002s autopkgtest [23:32:37]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 1002s autopkgtest [23:32:37]: test sssd-smart-card-pam-auth-configs: [----------------------- 1002s + '[' -z ubuntu ']' 1002s + export DEBIAN_FRONTEND=noninteractive 1002s + DEBIAN_FRONTEND=noninteractive 1002s + required_tools=(pamtester softhsm2-util sssd) 1002s + [[ ! -v OFFLINE_MODE ]] 1002s + for cmd in "${required_tools[@]}" 1002s + command -v pamtester 1002s + for cmd in "${required_tools[@]}" 1002s + command -v softhsm2-util 1002s + for cmd in "${required_tools[@]}" 1002s + command -v sssd 1002s + PIN=123456 1002s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 1002s + tmpdir=/tmp/sssd-softhsm2-certs-8q5P40 1002s + backupsdir= 1002s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 1002s + declare -a restore_paths 1002s + declare -a delete_paths 1002s + trap handle_exit EXIT 1002s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 1002s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 1002s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 1002s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 1002s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-8q5P40 GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 1002s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-8q5P40 1002s + GENERATE_SMART_CARDS=1 1002s + KEEP_TEMPORARY_FILES=1 1002s + NO_SSSD_TESTS=1 1002s + bash debian/tests/sssd-softhism2-certificates-tests.sh 1002s + '[' -z ubuntu ']' 1002s + required_tools=(p11tool openssl softhsm2-util) 1002s + for cmd in "${required_tools[@]}" 1002s + command -v p11tool 1002s + for cmd in "${required_tools[@]}" 1002s + command -v openssl 1002s + for cmd in "${required_tools[@]}" 1002s + command -v softhsm2-util 1002s + PIN=123456 1002s +++ find /usr/lib/softhsm/libsofthsm2.so 1002s +++ head -n 1 1002s ++ realpath /usr/lib/softhsm/libsofthsm2.so 1002s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 1002s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 1002s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 1002s + '[' '!' -v NO_SSSD_TESTS ']' 1002s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 1002s + tmpdir=/tmp/sssd-softhsm2-certs-8q5P40 1002s + keys_size=1024 1002s + [[ ! -v KEEP_TEMPORARY_FILES ]] 1002s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 1002s + echo -n 01 1002s + touch /tmp/sssd-softhsm2-certs-8q5P40/index.txt 1002s + mkdir -p /tmp/sssd-softhsm2-certs-8q5P40/new_certs 1002s + cat 1002s + root_ca_key_pass=pass:random-root-CA-password-22807 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-key.pem -passout pass:random-root-CA-password-22807 1024 1002s + openssl req -passin pass:random-root-CA-password-22807 -batch -config /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem 1002s + cat 1002s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-8490 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-8490 1024 1002s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-8490 -config /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-22807 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-certificate-request.pem 1002s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-certificate-request.pem 1002s Certificate Request: 1002s Data: 1002s Version: 1 (0x0) 1002s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1002s Subject Public Key Info: 1002s Public Key Algorithm: rsaEncryption 1002s Public-Key: (1024 bit) 1002s Modulus: 1002s 00:af:1b:dc:fd:3d:16:ba:c0:46:e7:fa:66:cb:63: 1002s fd:8c:bf:20:3f:9a:0c:80:db:d0:54:3c:00:dc:1d: 1002s 5c:c9:d4:1e:52:bc:68:ed:34:9e:bf:df:8b:da:83: 1002s ef:5a:50:e3:5b:b9:97:39:29:f1:8b:14:2e:1a:5c: 1002s ee:e2:a1:29:84:2a:5e:5e:12:f2:30:f5:2e:fb:5c: 1002s 3f:37:0a:51:36:53:77:af:a1:1c:e7:23:65:68:ea: 1002s a5:e4:cc:a4:83:5f:91:6d:68:cc:cf:6f:1c:33:7b: 1002s 8d:11:89:1c:e0:ff:dd:76:b4:01:7f:07:d2:b1:c9: 1002s 46:71:c6:8c:42:a3:89:98:9b 1002s Exponent: 65537 (0x10001) 1002s Attributes: 1002s (none) 1002s Requested Extensions: 1002s Signature Algorithm: sha256WithRSAEncryption 1002s Signature Value: 1002s 64:17:84:76:d4:39:24:66:1c:88:a0:b0:f2:d5:bb:a9:75:29: 1002s da:ca:78:5c:76:c4:97:ff:58:85:85:7b:a0:6b:47:d5:93:96: 1002s b2:ef:5c:66:9c:6f:67:88:88:19:e2:07:18:77:e6:b7:8a:d8: 1002s 8a:36:6b:8d:d4:e8:2a:06:b0:a2:5b:16:06:bb:0f:26:49:ea: 1002s 08:fb:14:a2:83:3c:3b:32:2d:d9:93:d2:2d:e4:10:db:34:f6: 1002s c5:53:18:8a:c0:7b:51:20:9f:c3:80:0d:f5:6b:02:7c:c6:71: 1002s ae:20:59:c1:1c:18:79:5b:66:0b:ad:a7:69:fa:55:91:7a:6d: 1002s b7:e2 1002s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.config -passin pass:random-root-CA-password-22807 -keyfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem 1002s Using configuration from /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.config 1002s Check that the request matches the signature 1002s Signature ok 1002s Certificate Details: 1002s Serial Number: 1 (0x1) 1002s Validity 1002s Not Before: Mar 4 23:32:36 2024 GMT 1002s Not After : Mar 4 23:32:36 2025 GMT 1002s Subject: 1002s organizationName = Test Organization 1002s organizationalUnitName = Test Organization Unit 1002s commonName = Test Organization Intermediate CA 1002s X509v3 extensions: 1002s X509v3 Subject Key Identifier: 1002s 48:92:13:09:5A:01:1F:5D:85:75:15:B0:B1:B1:0E:AD:25:B9:B4:36 1002s X509v3 Authority Key Identifier: 1002s keyid:97:49:93:0B:48:06:B6:13:A0:46:93:3E:B6:6D:49:E8:B7:A4:7A:E5 1002s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1002s serial:00 1002s X509v3 Basic Constraints: 1002s CA:TRUE 1002s X509v3 Key Usage: critical 1002s Digital Signature, Certificate Sign, CRL Sign 1002s Certificate is to be certified until Mar 4 23:32:36 2025 GMT (365 days) 1002s 1002s Write out database with 1 new entries 1002s Database updated 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem: OK 1002s + cat 1002s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-18854 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-18854 1024 1002s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-18854 -config /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-8490 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-certificate-request.pem 1002s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-certificate-request.pem 1002s Certificate Request: 1002s Data: 1002s Version: 1 (0x0) 1002s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1002s Subject Public Key Info: 1002s Public Key Algorithm: rsaEncryption 1002s Public-Key: (1024 bit) 1002s Modulus: 1002s 00:bd:aa:fc:18:01:71:7d:00:15:ac:c1:3c:e3:4c: 1002s 20:70:97:b8:34:eb:94:a4:2a:17:9a:f3:e4:b1:b6: 1002s 3b:a1:8a:7c:23:d1:fe:4c:c6:76:2a:fd:1b:4e:3c: 1002s 41:83:d8:bb:80:0b:59:04:60:4c:a9:72:d2:e4:e3: 1002s c2:28:e0:92:7c:92:9e:71:9e:94:8f:87:2b:a6:21: 1002s b3:54:1f:a4:78:9f:a1:dc:e8:3c:a3:d8:fa:51:89: 1002s ab:8d:67:b9:ed:a4:4f:da:c8:c8:94:9b:35:87:ff: 1002s 7f:9a:f5:8c:fb:6e:e2:08:1e:a6:59:0f:41:25:32: 1002s 2d:82:9d:ea:83:02:c1:b8:c3 1002s Exponent: 65537 (0x10001) 1002s Attributes: 1002s (none) 1002s Requested Extensions: 1002s Signature Algorithm: sha256WithRSAEncryption 1002s Signature Value: 1002s 49:82:b3:8b:e9:ec:8e:f7:c8:18:2e:36:71:9a:c5:13:82:ec: 1002s 01:10:06:d4:25:1e:dc:f8:dd:14:0e:61:87:87:78:a4:ee:de: 1002s 94:b4:fc:b2:42:7d:5a:a5:8b:2d:89:4e:06:65:de:53:0f:b2: 1002s 31:e4:3e:db:3e:8e:3a:06:61:42:cd:82:d7:7d:98:ee:42:67: 1002s 7f:e4:76:6b:1a:11:19:99:e7:20:be:e7:88:a3:12:4e:dc:62: 1002s e9:ba:f8:5e:b6:f3:3b:4c:4e:59:86:4b:ad:c3:c7:1a:78:20: 1002s 44:ed:93:55:72:c5:71:f3:48:f1:ac:ad:b5:3d:e5:3a:84:d0: 1002s 6d:0a 1002s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-8490 -keyfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s Using configuration from /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.config 1002s Check that the request matches the signature 1002s Signature ok 1002s Certificate Details: 1002s Serial Number: 2 (0x2) 1002s Validity 1002s Not Before: Mar 4 23:32:36 2024 GMT 1002s Not After : Mar 4 23:32:36 2025 GMT 1002s Subject: 1002s organizationName = Test Organization 1002s organizationalUnitName = Test Organization Unit 1002s commonName = Test Organization Sub Intermediate CA 1002s X509v3 extensions: 1002s X509v3 Subject Key Identifier: 1002s 73:E6:A1:75:19:2E:0C:58:59:2D:9B:29:1B:0C:62:89:48:61:99:A2 1002s X509v3 Authority Key Identifier: 1002s keyid:48:92:13:09:5A:01:1F:5D:85:75:15:B0:B1:B1:0E:AD:25:B9:B4:36 1002s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 1002s serial:01 1002s X509v3 Basic Constraints: 1002s CA:TRUE 1002s X509v3 Key Usage: critical 1002s Digital Signature, Certificate Sign, CRL Sign 1002s Certificate is to be certified until Mar 4 23:32:36 2025 GMT (365 days) 1002s 1002s Write out database with 1 new entries 1002s Database updated 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem: OK 1002s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1002s error 20 at 0 depth lookup: unable to get local issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem: verification failed 1002s + cat 1002s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-5438 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-5438 1024 1002s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-5438 -key /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-request.pem 1002s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-request.pem 1002s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.config -passin pass:random-root-CA-password-22807 -keyfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s Certificate Request: 1002s Data: 1002s Version: 1 (0x0) 1002s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1002s Subject Public Key Info: 1002s Public Key Algorithm: rsaEncryption 1002s Public-Key: (1024 bit) 1002s Modulus: 1002s 00:ea:78:db:70:ea:f7:44:30:46:bf:53:fd:ef:2b: 1002s 1f:3c:a2:22:0a:90:cb:db:a0:91:6f:73:1a:67:e9: 1002s f7:2d:bf:d8:bd:9f:cd:11:ab:7f:8e:e5:64:d1:48: 1002s 35:ce:86:32:d8:b1:84:85:3e:98:09:cd:95:bb:9f: 1002s aa:b4:1d:82:c5:f7:7c:05:97:6a:8c:2a:a7:41:59: 1002s 28:3f:94:c6:22:95:5b:6d:e4:8e:50:25:c1:eb:3e: 1002s 53:65:8d:5f:5d:ab:69:e2:f7:14:ba:2a:7d:0e:45: 1002s 04:f8:56:8e:18:42:4c:e7:56:76:51:5a:d7:1e:ec: 1002s be:d7:fd:e9:78:14:6f:a8:b1 1002s Exponent: 65537 (0x10001) 1002s Attributes: 1002s Requested Extensions: 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Root CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 77:6D:EC:7C:B6:8A:7B:70:1C:F0:32:EF:C6:80:C0:04:33:83:19:92 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Signature Algorithm: sha256WithRSAEncryption 1002s Signature Value: 1002s 14:70:e3:ed:b4:1b:9a:e0:63:e6:c9:6d:46:86:65:4f:0c:f1: 1002s 71:18:57:e5:4b:a6:c7:a0:86:09:33:eb:7a:13:f6:03:b9:f4: 1002s f4:1a:c9:e7:40:97:f4:ee:70:e0:19:1e:dc:6f:f1:91:a9:2e: 1002s c2:96:48:c4:1e:f5:b7:7b:ce:1f:5d:0d:73:5d:54:cf:72:7e: 1002s 1f:bf:b8:1b:df:f0:28:c4:78:39:21:2e:3f:d7:90:6c:29:e7: 1002s 29:a3:a6:d6:79:1e:de:b7:ff:0d:83:a7:df:32:76:58:f9:f0: 1002s 37:1f:2f:9b:e7:8a:c6:92:65:8c:2f:5f:f3:65:2e:dd:db:41: 1002s 9a:d3 1002s Using configuration from /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.config 1002s Check that the request matches the signature 1002s Signature ok 1002s Certificate Details: 1002s Serial Number: 3 (0x3) 1002s Validity 1002s Not Before: Mar 4 23:32:36 2024 GMT 1002s Not After : Mar 4 23:32:36 2025 GMT 1002s Subject: 1002s organizationName = Test Organization 1002s organizationalUnitName = Test Organization Unit 1002s commonName = Test Organization Root Trusted Certificate 0001 1002s X509v3 extensions: 1002s X509v3 Authority Key Identifier: 1002s 97:49:93:0B:48:06:B6:13:A0:46:93:3E:B6:6D:49:E8:B7:A4:7A:E5 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Root CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 77:6D:EC:7C:B6:8A:7B:70:1C:F0:32:EF:C6:80:C0:04:33:83:19:92 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Certificate is to be certified until Mar 4 23:32:36 2025 GMT (365 days) 1002s 1002s Write out database with 1 new entries 1002s Database updated 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem: OK 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 1002s error 20 at 0 depth lookup: unable to get local issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem: verification failed 1002s + cat 1002s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-17847 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-17847 1024 1002s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-17847 -key /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-request.pem 1002s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-request.pem 1002s Certificate Request: 1002s Data: 1002s Version: 1 (0x0) 1002s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 1002s Subject Public Key Info: 1002s Public Key Algorithm: rsaEncryption 1002s Public-Key: (1024 bit) 1002s Modulus: 1002s 00:94:bd:0e:5c:57:28:3b:a4:a2:70:fe:9f:4e:07: 1002s b6:60:35:c4:03:98:65:00:65:6b:d6:28:99:8d:d3: 1002s f3:a7:73:34:39:5e:9e:19:e4:95:6c:43:54:82:4c: 1002s e8:a7:1a:d0:27:b9:e8:92:2f:67:18:91:03:97:9c: 1002s f0:95:53:1d:6a:bc:34:52:78:f5:93:9c:8c:46:7a: 1002s 38:95:05:09:a3:47:51:8d:0c:93:60:23:83:eb:fa: 1002s c8:92:e8:35:67:e4:7c:46:6a:cf:84:8b:f2:fc:02: 1002s aa:6d:17:32:8d:6a:09:f1:bd:e6:a7:58:a7:fb:44: 1002s 7b:1d:dd:c3:f3:82:2d:96:5d 1002s Exponent: 65537 (0x10001) 1002s Attributes: 1002s Requested Extensions: 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Intermediate CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 7C:5B:21:79:2F:38:0D:93:69:16:C3:CC:B0:FE:16:B3:4D:F8:97:47 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Signature Algorithm: sha256WithRSAEncryption 1002s Signature Value: 1002s 0b:fb:3c:6a:45:3d:d3:ae:53:b7:14:2a:9b:a8:90:a5:a4:6b: 1002s 4b:bc:b1:49:5b:cc:89:a0:d6:01:0f:ea:df:af:56:81:43:69: 1002s a3:53:4d:9e:1e:3f:d2:3a:1c:22:6c:c3:8a:93:1b:4a:74:8d: 1002s 3f:9b:a6:14:b3:7d:06:7c:44:0f:06:d4:e8:e8:31:15:41:b4: 1002s 76:cc:15:84:f6:1a:aa:b5:9a:cc:58:1e:f1:28:32:d3:77:2e: 1002s ee:f0:67:53:39:dd:99:a4:c5:50:2f:6d:c9:5e:a4:19:42:4b: 1002s e5:8d:7f:ab:0a:ed:d6:8a:e0:8e:1e:93:62:17:6b:a7:b3:c3: 1002s 87:03 1002s + openssl ca -passin pass:random-intermediate-CA-password-8490 -config /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s Using configuration from /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.config 1002s Check that the request matches the signature 1002s Signature ok 1002s Certificate Details: 1002s Serial Number: 4 (0x4) 1002s Validity 1002s Not Before: Mar 4 23:32:37 2024 GMT 1002s Not After : Mar 4 23:32:37 2025 GMT 1002s Subject: 1002s organizationName = Test Organization 1002s organizationalUnitName = Test Organization Unit 1002s commonName = Test Organization Intermediate Trusted Certificate 0001 1002s X509v3 extensions: 1002s X509v3 Authority Key Identifier: 1002s 48:92:13:09:5A:01:1F:5D:85:75:15:B0:B1:B1:0E:AD:25:B9:B4:36 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Intermediate CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 7C:5B:21:79:2F:38:0D:93:69:16:C3:CC:B0:FE:16:B3:4D:F8:97:47 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Certificate is to be certified until Mar 4 23:32:37 2025 GMT (365 days) 1002s 1002s Write out database with 1 new entries 1002s Database updated 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s This certificate should not be trusted fully 1002s + echo 'This certificate should not be trusted fully' 1002s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1002s error 2 at 1 depth lookup: unable to get issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 1002s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem: OK 1002s + cat 1002s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10433 1002s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-10433 1024 1002s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10433 -key /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1002s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 1002s + openssl ca -passin pass:random-sub-intermediate-CA-password-18854 -config /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s Certificate Request: 1002s Data: 1002s Version: 1 (0x0) 1002s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1002s Subject Public Key Info: 1002s Public Key Algorithm: rsaEncryption 1002s Public-Key: (1024 bit) 1002s Modulus: 1002s 00:d7:07:35:c3:46:76:5a:f9:58:20:2b:81:62:76: 1002s dc:30:a9:ce:58:11:0a:7c:bb:8e:94:8f:36:aa:a0: 1002s c2:20:69:2b:04:95:c7:42:27:59:86:9f:eb:91:8e: 1002s 76:1e:27:96:fe:4f:b2:66:70:3d:a2:2e:bc:e9:f3: 1002s 2a:b6:e2:67:05:0b:94:5a:13:a8:db:73:1c:bc:23: 1002s 4b:db:e7:07:a2:b7:87:4c:53:6f:f2:14:d0:da:9f: 1002s 49:87:4a:ff:bb:c1:ef:a4:b5:94:c2:44:49:96:bf: 1002s 3a:66:d8:fa:ee:ea:89:bc:01:95:32:dc:d5:06:c3: 1002s 0b:85:68:9b:f6:a4:34:b4:1f 1002s Exponent: 65537 (0x10001) 1002s Attributes: 1002s Requested Extensions: 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Sub Intermediate CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 1D:CA:F1:4B:0F:43:C9:C7:3F:B2:6E:62:18:75:E7:3C:DE:ED:47:BD 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Signature Algorithm: sha256WithRSAEncryption 1002s Signature Value: 1002s 38:f4:3d:e0:00:ff:d0:ff:c8:01:53:39:c9:c4:4e:73:78:b8: 1002s 83:ce:73:21:57:05:51:62:f2:72:fb:8b:ab:7a:86:ec:9c:60: 1002s 0d:63:93:56:1a:58:0b:bb:81:f9:16:5a:c0:0f:7e:80:19:72: 1002s 3e:ca:77:81:09:9a:14:02:2c:af:f0:20:0c:2c:f2:e5:e4:fd: 1002s f3:70:f5:2e:ea:ae:25:c9:6a:e2:d6:43:e3:72:2c:42:b7:eb: 1002s d8:98:5a:b0:00:15:09:6a:b3:dd:3d:ca:8f:09:a6:b5:fc:01: 1002s 65:81:0d:45:ac:65:5c:32:d4:10:2e:a6:6a:b2:4d:8e:fa:aa: 1002s 84:42 1002s Using configuration from /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.config 1002s Check that the request matches the signature 1002s Signature ok 1002s Certificate Details: 1002s Serial Number: 5 (0x5) 1002s Validity 1002s Not Before: Mar 4 23:32:37 2024 GMT 1002s Not After : Mar 4 23:32:37 2025 GMT 1002s Subject: 1002s organizationName = Test Organization 1002s organizationalUnitName = Test Organization Unit 1002s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 1002s X509v3 extensions: 1002s X509v3 Authority Key Identifier: 1002s 73:E6:A1:75:19:2E:0C:58:59:2D:9B:29:1B:0C:62:89:48:61:99:A2 1002s X509v3 Basic Constraints: 1002s CA:FALSE 1002s Netscape Cert Type: 1002s SSL Client, S/MIME 1002s Netscape Comment: 1002s Test Organization Sub Intermediate CA trusted Certificate 1002s X509v3 Subject Key Identifier: 1002s 1D:CA:F1:4B:0F:43:C9:C7:3F:B2:6E:62:18:75:E7:3C:DE:ED:47:BD 1002s X509v3 Key Usage: critical 1002s Digital Signature, Non Repudiation, Key Encipherment 1002s X509v3 Extended Key Usage: 1002s TLS Web Client Authentication, E-mail Protection 1002s X509v3 Subject Alternative Name: 1002s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 1002s Certificate is to be certified until Mar 4 23:32:37 2025 GMT (365 days) 1002s 1002s Write out database with 1 new entries 1002s Database updated 1002s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s + echo 'This certificate should not be trusted fully' 1002s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s This certificate should not be trusted fully 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1002s error 2 at 1 depth lookup: unable to get issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1002s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1002s error 20 at 0 depth lookup: unable to get local issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1002s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1002s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s + local cmd=openssl 1002s + shift 1002s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 1002s error 20 at 0 depth lookup: unable to get local issuer certificate 1002s error /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 1002s + echo 'Building a the full-chain CA file...' 1002s + cat /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s Building a the full-chain CA file... 1002s + cat /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem 1002s + cat /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1002s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem 1002s + openssl pkcs7 -print_certs -noout 1002s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1002s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1002s 1002s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1002s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 1002s 1002s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 1002s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 1002s 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA.pem: OK 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem: OK 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem: OK 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-root-intermediate-chain-CA.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-root-intermediate-chain-CA.pem: OK 1002s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1002s /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 1002s + echo 'Certificates generation completed!' 1002s Certificates generation completed! 1002s + [[ -v NO_SSSD_TESTS ]] 1002s + [[ -v GENERATE_SMART_CARDS ]] 1002s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-5438 1002s + local certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s + local key_pass=pass:random-root-ca-trusted-cert-0001-5438 1002s + local key_cn 1002s + local key_name 1002s + local tokens_dir 1002s + local output_cert_file 1002s + token_name= 1002s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem .pem 1002s + key_name=test-root-CA-trusted-certificate-0001 1002s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem 1002s ++ sed -n 's/ *commonName *= //p' 1002s + key_cn='Test Organization Root Trusted Certificate 0001' 1002s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1002s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf 1002s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf 1002s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 1002s + tokens_dir=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001 1002s + token_name='Test Organization Root Tr Token' 1002s + '[' '!' -e /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 1002s + local key_file 1002s + local decrypted_key 1002s + mkdir -p /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001 1002s + key_file=/tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key.pem 1002s + decrypted_key=/tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1002s + cat 1002s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 1002s Slot 0 has a free/uninitialized token. 1002s The token has been initialized and is reassigned to slot 363513342 1003s + softhsm2-util --show-slots 1003s Available slots: 1003s Slot 363513342 1003s Slot info: 1003s Description: SoftHSM slot ID 0x15aac5fe 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: eb5a2c6095aac5fe 1003s Initialized: yes 1003s User PIN init.: yes 1003s Label: Test Organization Root Tr Token 1003s Slot 1 1003s Slot info: 1003s Description: SoftHSM slot ID 0x1 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: 1003s Initialized: no 1003s User PIN init.: no 1003s Label: 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-5438 -in /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1003s writing RSA key 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + rm /tmp/sssd-softhsm2-certs-8q5P40/test-root-CA-trusted-certificate-0001-key-decrypted.pem 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 1003s Object 0: 1003s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=eb5a2c6095aac5fe;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 1003s Type: X.509 Certificate (RSA-1024) 1003s Expires: Tue Mar 4 23:32:36 2025 1003s Label: Test Organization Root Trusted Certificate 0001 1003s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1003s 1003s Test Organization Root Tr Token 1003s + echo 'Test Organization Root Tr Token' 1003s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-17847 1003s + local certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1003s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-17847 1003s + local key_cn 1003s + local key_name 1003s + local tokens_dir 1003s + local output_cert_file 1003s + token_name= 1003s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem .pem 1003s + key_name=test-intermediate-CA-trusted-certificate-0001 1003s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem 1003s ++ sed -n 's/ *commonName *= //p' 1003s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 1003s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1003s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1003s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 1003s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 1003s + tokens_dir=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001 1003s + token_name='Test Organization Interme Token' 1003s + '[' '!' -e /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 1003s + local key_file 1003s + local decrypted_key 1003s + mkdir -p /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-intermediate-CA-trusted-certificate-0001 1003s + key_file=/tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key.pem 1003s + decrypted_key=/tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s + cat 1003s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 1003s Slot 0 has a free/uninitialized token. 1003s The token has been initialized and is reassigned to slot 1172899245 1003s + softhsm2-util --show-slots 1003s Available slots: 1003s Slot 1172899245 1003s Slot info: 1003s Description: SoftHSM slot ID 0x45e905ad 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: afaa200845e905ad 1003s Initialized: yes 1003s User PIN init.: yes 1003s Label: Test Organization Interme Token 1003s Slot 1 1003s Slot info: 1003s Description: SoftHSM slot ID 0x1 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: 1003s Initialized: no 1003s User PIN init.: no 1003s Label: 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-17847 -in /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s writing RSA key 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + rm /tmp/sssd-softhsm2-certs-8q5P40/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 1003s Object 0: 1003s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=afaa200845e905ad;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 1003s Type: X.509 Certificate (RSA-1024) 1003s Expires: Tue Mar 4 23:32:37 2025 1003s Label: Test Organization Intermediate Trusted Certificate 0001 1003s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1003s 1003s Test Organization Interme Token 1003s + echo 'Test Organization Interme Token' 1003s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10433 1003s + local certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1003s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10433 1003s + local key_cn 1003s + local key_name 1003s + local tokens_dir 1003s + local output_cert_file 1003s + token_name= 1003s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 1003s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 1003s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem 1003s ++ sed -n 's/ *commonName *= //p' 1003s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 1003s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 1003s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1003s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1003s ++ basename /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 1003s + tokens_dir=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1003s + token_name='Test Organization Sub Int Token' 1003s + '[' '!' -e /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 1003s + local key_file 1003s + local decrypted_key 1003s + mkdir -p /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 1003s + key_file=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 1003s + decrypted_key=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s + cat 1003s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 1003s + softhsm2-util --show-slots 1003s Slot 0 has a free/uninitialized token. 1003s The token has been initialized and is reassigned to slot 766985878 1003s Available slots: 1003s Slot 766985878 1003s Slot info: 1003s Description: SoftHSM slot ID 0x2db74696 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: f5e47b34adb74696 1003s Initialized: yes 1003s User PIN init.: yes 1003s Label: Test Organization Sub Int Token 1003s Slot 1 1003s Slot info: 1003s Description: SoftHSM slot ID 0x1 1003s Manufacturer ID: SoftHSM project 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Token present: yes 1003s Token info: 1003s Manufacturer ID: SoftHSM project 1003s Model: SoftHSM v2 1003s Hardware version: 2.6 1003s Firmware version: 2.6 1003s Serial number: 1003s Initialized: no 1003s User PIN init.: no 1003s Label: 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10433 -in /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s writing RSA key 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 1003s + rm /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 1003s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 1003s Object 0: 1003s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f5e47b34adb74696;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 1003s Type: X.509 Certificate (RSA-1024) 1003s Expires: Tue Mar 4 23:32:37 2025 1003s Label: Test Organization Sub Intermediate Trusted Certificate 0001 1003s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 1003s 1003s + echo 'Test Organization Sub Int Token' 1003s + echo 'Certificates generation completed!' 1003s + exit 0 1003s Test Organization Sub Int Token 1003s Certificates generation completed! 1003s + find /tmp/sssd-softhsm2-certs-8q5P40 -type d -exec chmod 777 '{}' ';' 1003s + find /tmp/sssd-softhsm2-certs-8q5P40 -type f -exec chmod 666 '{}' ';' 1003s + backup_file /etc/sssd/sssd.conf 1003s + '[' -z '' ']' 1003s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 1003s + backupsdir=/tmp/sssd-softhsm2-backups-ZgkdcR 1003s + '[' -e /etc/sssd/sssd.conf ']' 1003s + delete_paths+=("$1") 1003s + rm -f /etc/sssd/sssd.conf 1003s ++ runuser -u ubuntu -- sh -c 'echo ~' 1003s + user_home=/home/ubuntu 1003s + mkdir -p /home/ubuntu 1003s + chown ubuntu:ubuntu /home/ubuntu 1003s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 1003s + user_config=/home/ubuntu/.config 1003s + system_config=/etc 1003s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 1003s + for path_pair in "${softhsm2_conf_paths[@]}" 1003s + IFS=: 1003s + read -r -a path 1003s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1003s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 1003s + '[' -z /tmp/sssd-softhsm2-backups-ZgkdcR ']' 1003s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 1003s + delete_paths+=("$1") 1003s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1003s + for path_pair in "${softhsm2_conf_paths[@]}" 1003s + IFS=: 1003s + read -r -a path 1003s + path=/etc/softhsm/softhsm2.conf 1003s + backup_file /etc/softhsm/softhsm2.conf 1003s + '[' -z /tmp/sssd-softhsm2-backups-ZgkdcR ']' 1003s + '[' -e /etc/softhsm/softhsm2.conf ']' 1003s ++ dirname /etc/softhsm/softhsm2.conf 1003s + local back_dir=/tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm 1003s ++ basename /etc/softhsm/softhsm2.conf 1003s + local back_path=/tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm/softhsm2.conf 1003s + '[' '!' -e /tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm/softhsm2.conf ']' 1003s + mkdir -p /tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm 1003s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm/softhsm2.conf 1003s + restore_paths+=("$back_path") 1003s + rm -f /etc/softhsm/softhsm2.conf 1003s + test_authentication login /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem 1003s + pam_service=login 1003s + certificate_config=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf 1003s + ca_db=/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem 1003s + verification_options= 1003s + mkdir -p -m 700 /etc/sssd 1003s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 1003s + cat 1003s Using CA DB '/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem' with verification options: '' 1003s + chmod 600 /etc/sssd/sssd.conf 1003s + for path_pair in "${softhsm2_conf_paths[@]}" 1003s + IFS=: 1003s + read -r -a path 1003s + user=ubuntu 1003s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1003s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1003s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1003s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1003s + runuser -u ubuntu -- softhsm2-util --show-slots 1003s + grep 'Test Organization' 1003s Label: Test Organization Root Tr Token 1003s + for path_pair in "${softhsm2_conf_paths[@]}" 1003s + IFS=: 1003s + read -r -a path 1003s + user=root 1003s + path=/etc/softhsm/softhsm2.conf 1003s ++ dirname /etc/softhsm/softhsm2.conf 1003s + runuser -u root -- mkdir -p /etc/softhsm 1003s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1003s + runuser -u root -- softhsm2-util --show-slots 1003s + grep 'Test Organization' 1003s Label: Test Organization Root Tr Token 1003s + systemctl restart sssd 1003s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1003s + for alternative in "${alternative_pam_configs[@]}" 1003s + pam-auth-update --enable sss-smart-card-optional 1003s + cat /etc/pam.d/common-auth 1003s # 1003s # /etc/pam.d/common-auth - authentication settings common to all services 1003s # 1003s # This file is included from other service-specific PAM config files, 1003s # and should contain a list of the authentication modules that define 1003s # the central authentication scheme for use on the system 1003s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1003s # traditional Unix authentication mechanisms. 1003s # 1003s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1003s # To take advantage of this, it is recommended that you configure any 1003s # local modules either before or after the default block, and use 1003s # pam-auth-update to manage selection of other modules. See 1003s # pam-auth-update(8) for details. 1003s 1003s # here are the per-package modules (the "Primary" block) 1003s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1003s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1003s auth [success=1 default=ignore] pam_sss.so use_first_pass 1003s # here's the fallback if no module succeeds 1003s auth requisite pam_deny.so 1003s # prime the stack with a positive return value if there isn't one already; 1003s # this avoids us returning an error just because nothing sets a success code 1003s # since the modules above will each just jump around 1003s auth required pam_permit.so 1003s # and here are more per-package modules (the "Additional" block) 1003s auth optional pam_cap.so 1003s # end of pam-auth-update config 1003s + echo -n -e 123456 1003s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1004s pamtester: invoking pam_start(login, ubuntu, ...) 1004s pamtester: performing operation - authenticate 1004s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1004s + echo -n -e 123456 1004s + runuser -u ubuntu -- pamtester -v login '' authenticate 1004s pamtester: invoking pam_start(login, , ...) 1004s pamtester: performing operation - authenticate 1004s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1004s + echo -n -e wrong123456 1004s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1004s pamtester: invoking pam_start(login, ubuntu, ...) 1004s pamtester: performing operation - authenticate 1008s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 1008s + echo -n -e wrong123456 1008s + runuser -u ubuntu -- pamtester -v login '' authenticate 1008s pamtester: invoking pam_start(login, , ...) 1008s pamtester: performing operation - authenticate 1011s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 1011s + echo -n -e 123456 1011s + pamtester -v login root authenticate 1011s pamtester: invoking pam_start(login, root, ...) 1011s pamtester: performing operation - authenticate 1014s Password: pamtester: Authentication failure 1014s + for alternative in "${alternative_pam_configs[@]}" 1014s + pam-auth-update --enable sss-smart-card-required 1014s PAM configuration 1014s ----------------- 1014s 1014s Incompatible PAM profiles selected. 1014s 1014s The following PAM profiles cannot be used together: 1014s 1014s SSS required smart card authentication, SSS optional smart card 1014s authentication 1014s 1014s Please select a different set of modules to enable. 1014s 1014s + cat /etc/pam.d/common-auth 1014s # 1014s # /etc/pam.d/common-auth - authentication settings common to all services 1014s # 1014s # This file is included from other service-specific PAM config files, 1014s # and should contain a list of the authentication modules that define 1014s # the central authentication scheme for use on the system 1014s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1014s # traditional Unix authentication mechanisms. 1014s # 1014s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1014s # To take advantage of this, it is recommended that you configure any 1014s # local modules either before or after the default block, and use 1014s # pam-auth-update to manage selection of other modules. See 1014s # pam-auth-update(8) for details. 1014s 1014s # here are the per-package modules (the "Primary" block) 1014s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1014s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1014s auth [success=1 default=ignore] pam_sss.so use_first_pass 1014s # here's the fallback if no module succeeds 1014s auth requisite pam_deny.so 1014s # prime the stack with a positive return value if there isn't one already; 1014s # this avoids us returning an error just because nothing sets a success code 1014s # since the modules above will each just jump around 1014s auth required pam_permit.so 1014s # and here are more per-package modules (the "Additional" block) 1014s auth optional pam_cap.so 1014s # end of pam-auth-update config 1014s + echo -n -e 123456 1014s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1014s pamtester: invoking pam_start(login, ubuntu, ...) 1014s pamtester: performing operation - authenticate 1014s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1014s + echo -n -e 123456 1014s + runuser -u ubuntu -- pamtester -v login '' authenticate 1014s pamtester: invoking pam_start(login, , ...) 1014s pamtester: performing operation - authenticate 1014s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 1014s + echo -n -e wrong123456 1014s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1014s pamtester: invoking pam_start(login, ubuntu, ...) 1014s pamtester: performing operation - authenticate 1017s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 1017s + echo -n -e wrong123456 1017s + runuser -u ubuntu -- pamtester -v login '' authenticate 1017s pamtester: invoking pam_start(login, , ...) 1017s pamtester: performing operation - authenticate 1019s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 1019s + echo -n -e 123456 1019s + pamtester -v login root authenticate 1019s pamtester: invoking pam_start(login, root, ...) 1019s pamtester: performing operation - authenticate 1023s pamtester: Authentication service cannot retrieve authentication info 1023s + test_authentication login /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem 1023s + pam_service=login 1023s + certificate_config=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1023s + ca_db=/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem 1023s + verification_options= 1023s + mkdir -p -m 700 /etc/sssd 1023s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 1023s + cat 1023s Using CA DB '/tmp/sssd-softhsm2-certs-8q5P40/test-full-chain-CA.pem' with verification options: '' 1023s + chmod 600 /etc/sssd/sssd.conf 1023s + for path_pair in "${softhsm2_conf_paths[@]}" 1023s + IFS=: 1023s + read -r -a path 1023s + user=ubuntu 1023s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1023s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1023s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1023s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1023s + runuser -u ubuntu -- softhsm2-util --show-slots 1023s + grep 'Test Organization' 1023s Label: Test Organization Sub Int Token 1023s + for path_pair in "${softhsm2_conf_paths[@]}" 1023s + IFS=: 1023s + read -r -a path 1023s + user=root 1023s + path=/etc/softhsm/softhsm2.conf 1023s ++ dirname /etc/softhsm/softhsm2.conf 1023s + runuser -u root -- mkdir -p /etc/softhsm 1023s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1023s + runuser -u root -- softhsm2-util --show-slots 1023s + grep 'Test Organization' 1023s Label: Test Organization Sub Int Token 1023s + systemctl restart sssd 1023s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1023s + for alternative in "${alternative_pam_configs[@]}" 1023s + pam-auth-update --enable sss-smart-card-optional 1023s + cat /etc/pam.d/common-auth 1023s # 1023s # /etc/pam.d/common-auth - authentication settings common to all services 1023s # 1023s # This file is included from other service-specific PAM config files, 1023s # and should contain a list of the authentication modules that define 1023s # the central authentication scheme for use on the system 1023s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1023s # traditional Unix authentication mechanisms. 1023s # 1023s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1023s # To take advantage of this, it is recommended that you configure any 1023s # local modules either before or after the default block, and use 1023s # pam-auth-update to manage selection of other modules. See 1023s # pam-auth-update(8) for details. 1023s 1023s # here are the per-package modules (the "Primary" block) 1023s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1023s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1023s auth [success=1 default=ignore] pam_sss.so use_first_pass 1023s # here's the fallback if no module succeeds 1023s auth requisite pam_deny.so 1023s # prime the stack with a positive return value if there isn't one already; 1023s # this avoids us returning an error just because nothing sets a success code 1023s # since the modules above will each just jump around 1023s auth required pam_permit.so 1023s # and here are more per-package modules (the "Additional" block) 1023s auth optional pam_cap.so 1023s # end of pam-auth-update config 1023s + echo -n -e 123456 1023s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1023s pamtester: invoking pam_start(login, ubuntu, ...) 1023s pamtester: performing operation - authenticate 1023s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1023s + echo -n -e 123456 1023s + runuser -u ubuntu -- pamtester -v login '' authenticate 1023s pamtester: invoking pam_start(login, , ...) 1023s pamtester: performing operation - authenticate 1023s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1023s + echo -n -e wrong123456 1023s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1023s pamtester: invoking pam_start(login, ubuntu, ...) 1023s pamtester: performing operation - authenticate 1026s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1026s + echo -n -e wrong123456 1026s + runuser -u ubuntu -- pamtester -v login '' authenticate 1026s pamtester: invoking pam_start(login, , ...) 1026s pamtester: performing operation - authenticate 1029s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1029s + echo -n -e 123456 1029s + pamtester -v login root authenticate 1029s pamtester: invoking pam_start(login, root, ...) 1029s pamtester: performing operation - authenticate 1033s Password: pamtester: Authentication failure 1033s + for alternative in "${alternative_pam_configs[@]}" 1033s + pam-auth-update --enable sss-smart-card-required 1033s PAM configuration 1033s ----------------- 1033s 1033s Incompatible PAM profiles selected. 1033s 1033s The following PAM profiles cannot be used together: 1033s 1033s SSS required smart card authentication, SSS optional smart card 1033s authentication 1033s 1033s Please select a different set of modules to enable. 1033s 1033s + cat /etc/pam.d/common-auth 1033s # 1033s # /etc/pam.d/common-auth - authentication settings common to all services 1033s # 1033s # This file is included from other service-specific PAM config files, 1033s # and should contain a list of the authentication modules that define 1033s # the central authentication scheme for use on the system 1033s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1033s # traditional Unix authentication mechanisms. 1033s # 1033s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1033s # To take advantage of this, it is recommended that you configure any 1033s # local modules either before or after the default block, and use 1033s # pam-auth-update to manage selection of other modules. See 1033s # pam-auth-update(8) for details. 1033s 1033s # here are the per-package modules (the "Primary" block) 1033s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1033s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1033s auth [success=1 default=ignore] pam_sss.so use_first_pass 1033s # here's the fallback if no module succeeds 1033s auth requisite pam_deny.so 1033s # prime the stack with a positive return value if there isn't one already; 1033s # this avoids us returning an error just because nothing sets a success code 1033s # since the modules above will each just jump around 1033s auth required pam_permit.so 1033s # and here are more per-package modules (the "Additional" block) 1033s auth optional pam_cap.so 1033s # end of pam-auth-update config 1033s + echo -n -e 123456 1033s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1033s pamtester: invoking pam_start(login, ubuntu, ...) 1033s pamtester: performing operation - authenticate 1033s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1033s + echo -n -e 123456 1033s + runuser -u ubuntu -- pamtester -v login '' authenticate 1033s pamtester: invoking pam_start(login, , ...) 1033s pamtester: performing operation - authenticate 1033s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1033s + echo -n -e wrong123456 1033s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1033s pamtester: invoking pam_start(login, ubuntu, ...) 1033s pamtester: performing operation - authenticate 1036s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1036s + echo -n -e wrong123456 1036s + runuser -u ubuntu -- pamtester -v login '' authenticate 1036s pamtester: invoking pam_start(login, , ...) 1036s pamtester: performing operation - authenticate 1039s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1039s + echo -n -e 123456 1039s + pamtester -v login root authenticate 1039s pamtester: invoking pam_start(login, root, ...) 1039s pamtester: performing operation - authenticate 1042s pamtester: Authentication service cannot retrieve authentication info 1042s + test_authentication login /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem partial_chain 1042s + pam_service=login 1042s + certificate_config=/tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1042s + ca_db=/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem 1042s + verification_options=partial_chain 1042s + mkdir -p -m 700 /etc/sssd 1042s Using CA DB '/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 1042s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-8q5P40/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 1042s + cat 1042s + chmod 600 /etc/sssd/sssd.conf 1042s + for path_pair in "${softhsm2_conf_paths[@]}" 1042s + IFS=: 1042s + read -r -a path 1042s + user=ubuntu 1042s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1042s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1042s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1042s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1042s + runuser -u ubuntu -- softhsm2-util --show-slots 1042s + grep 'Test Organization' 1042s Label: Test Organization Sub Int Token 1042s + for path_pair in "${softhsm2_conf_paths[@]}" 1042s + IFS=: 1042s + read -r -a path 1042s + user=root 1042s + path=/etc/softhsm/softhsm2.conf 1042s ++ dirname /etc/softhsm/softhsm2.conf 1042s + runuser -u root -- mkdir -p /etc/softhsm 1042s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-8q5P40/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1042s + runuser -u root -- softhsm2-util --show-slots 1042s + grep 'Test Organization' 1042s Label: Test Organization Sub Int Token 1042s + systemctl restart sssd 1042s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1042s + for alternative in "${alternative_pam_configs[@]}" 1042s + pam-auth-update --enable sss-smart-card-optional 1042s + cat /etc/pam.d/common-auth 1042s # 1042s # /etc/pam.d/common-auth - authentication settings common to all services 1042s # 1042s # This file is included from other service-specific PAM config files, 1042s # and should contain a list of the authentication modules that define 1042s # the central authentication scheme for use on the system 1042s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1042s # traditional Unix authentication mechanisms. 1042s # 1042s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1042s # To take advantage of this, it is recommended that you configure any 1042s # local modules either before or after the default block, and use 1042s # pam-auth-update to manage selection of other modules. See 1042s # pam-auth-update(8) for details. 1042s 1042s # here are the per-package modules (the "Primary" block) 1042s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1042s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1042s auth [success=1 default=ignore] pam_sss.so use_first_pass 1042s # here's the fallback if no module succeeds 1042s auth requisite pam_deny.so 1042s # prime the stack with a positive return value if there isn't one already; 1042s # this avoids us returning an error just because nothing sets a success code 1042s # since the modules above will each just jump around 1042s auth required pam_permit.so 1042s # and here are more per-package modules (the "Additional" block) 1042s auth optional pam_cap.so 1042s # end of pam-auth-update config 1042s + echo -n -e 123456 1042s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1042s pamtester: invoking pam_start(login, ubuntu, ...) 1042s pamtester: performing operation - authenticate 1042s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1042s + echo -n -e 123456 1042s + runuser -u ubuntu -- pamtester -v login '' authenticate 1042s pamtester: invoking pam_start(login, , ...) 1042s pamtester: performing operation - authenticate 1042s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1042s + echo -n -e wrong123456 1042s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1042s pamtester: invoking pam_start(login, ubuntu, ...) 1042s pamtester: performing operation - authenticate 1046s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1046s + echo -n -e wrong123456 1046s + runuser -u ubuntu -- pamtester -v login '' authenticate 1046s pamtester: invoking pam_start(login, , ...) 1046s pamtester: performing operation - authenticate 1049s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1049s + echo -n -e 123456 1049s + pamtester -v login root authenticate 1049s pamtester: invoking pam_start(login, root, ...) 1049s pamtester: performing operation - authenticate 1052s Password: pamtester: Authentication failure 1052s + for alternative in "${alternative_pam_configs[@]}" 1052s + pam-auth-update --enable sss-smart-card-required 1052s PAM configuration 1052s ----------------- 1052s 1052s Incompatible PAM profiles selected. 1052s 1052s The following PAM profiles cannot be used together: 1052s 1052s SSS required smart card authentication, SSS optional smart card 1052s authentication 1052s 1052s Please select a different set of modules to enable. 1052s 1052s + cat /etc/pam.d/common-auth 1052s # 1052s # /etc/pam.d/common-auth - authentication settings common to all services 1052s # 1052s # This file is included from other service-specific PAM config files, 1052s # and should contain a list of the authentication modules that define 1052s # the central authentication scheme for use on the system 1052s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1052s # traditional Unix authentication mechanisms. 1052s # 1052s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1052s # To take advantage of this, it is recommended that you configure any 1052s # local modules either before or after the default block, and use 1052s # pam-auth-update to manage selection of other modules. See 1052s # pam-auth-update(8) for details. 1052s 1052s # here are the per-package modules (the "Primary" block) 1052s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1052s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1052s auth [success=1 default=ignore] pam_sss.so use_first_pass 1052s # here's the fallback if no module succeeds 1052s auth requisite pam_deny.so 1052s # prime the stack with a positive return value if there isn't one already; 1052s # this avoids us returning an error just because nothing sets a success code 1052s # since the modules above will each just jump around 1052s auth required pam_permit.so 1052s # and here are more per-package modules (the "Additional" block) 1052s auth optional pam_cap.so 1052s # end of pam-auth-update config 1052s + echo -n -e 123456 1052s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1052s pamtester: invoking pam_start(login, ubuntu, ...) 1052s pamtester: performing operation - authenticate 1052s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1052s + echo -n -e 123456 1052s + runuser -u ubuntu -- pamtester -v login '' authenticate 1052s pamtester: invoking pam_start(login, , ...) 1052s pamtester: performing operation - authenticate 1052s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1052s + echo -n -e wrong123456 1052s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1052s pamtester: invoking pam_start(login, ubuntu, ...) 1052s pamtester: performing operation - authenticate 1056s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1056s + echo -n -e wrong123456 1056s + runuser -u ubuntu -- pamtester -v login '' authenticate 1056s pamtester: invoking pam_start(login, , ...) 1056s pamtester: performing operation - authenticate 1059s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1059s + echo -n -e 123456 1059s + pamtester -v login root authenticate 1059s pamtester: invoking pam_start(login, root, ...) 1059s pamtester: performing operation - authenticate 1062s pamtester: Authentication service cannot retrieve authentication info 1062s + handle_exit 1062s + exit_code=0 1062s + restore_changes 1062s + for path in "${restore_paths[@]}" 1062s + local original_path 1062s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-ZgkdcR /tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm/softhsm2.conf 1062s + original_path=/etc/softhsm/softhsm2.conf 1062s + rm /etc/softhsm/softhsm2.conf 1062s + mv /tmp/sssd-softhsm2-backups-ZgkdcR//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 1062s + for path in "${delete_paths[@]}" 1062s + rm -f /etc/sssd/sssd.conf 1062s + for path in "${delete_paths[@]}" 1062s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1062s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1063s + '[' -e /etc/sssd/sssd.conf ']' 1063s + systemctl stop sssd 1063s + '[' -e /etc/softhsm/softhsm2.conf ']' 1063s + chmod 600 /etc/softhsm/softhsm2.conf 1063s + rm -rf /tmp/sssd-softhsm2-certs-8q5P40 1063s + '[' 0 = 0 ']' 1063s + rm -rf /tmp/sssd-softhsm2-backups-ZgkdcR 1063s Script completed successfully! 1063s + set +x 1063s autopkgtest [23:33:38]: test sssd-smart-card-pam-auth-configs: -----------------------] 1063s autopkgtest [23:33:38]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 1063s sssd-smart-card-pam-auth-configs PASS 1063s autopkgtest [23:33:38]: @@@@@@@@@@@@@@@@@@@@ summary 1063s ldap-user-group-ldap-auth PASS 1063s ldap-user-group-krb5-auth PASS 1063s sssd-softhism2-certificates-tests.sh PASS 1063s sssd-smart-card-pam-auth-configs PASS 1073s Creating nova instance adt-noble-amd64-sssd-20240304-231555-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-amd64-server-20240304.img (UUID ae047650-70fb-43f4-8dd2-17d325c301dd)... 1073s Creating nova instance adt-noble-amd64-sssd-20240304-231555-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-amd64-server-20240304.img (UUID ae047650-70fb-43f4-8dd2-17d325c301dd)...