0s autopkgtest [18:27:19]: starting date and time: 2024-03-13 18:27:19+0000 0s autopkgtest [18:27:19]: git checkout: b506e79c ssh-setup/nova: fix ARCH having two lines of data 0s autopkgtest [18:27:19]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.9mg3aihd/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:sssd,src:gnutls28,src:libtirpc,src:nettle,src:nfs-utils,src:openssl,src:samba,src:tevent --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=sssd/2.9.4-1.1ubuntu2 gnutls28/3.8.3-1.1ubuntu2 libtirpc/1.3.4+ds-1.1 nettle/3.9.1-2.2 nfs-utils/1:2.6.4-3ubuntu3 openssl/3.0.13-0ubuntu1 samba/2:4.19.5+dfsg-4ubuntu2 tevent/0.16.1-2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@lcy02-18.secgroup --name adt-noble-amd64-sssd-20240313-182719-juju-7f2275-prod-proposed-migration-environment-3 --image adt/ubuntu-noble-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 226s autopkgtest [18:31:05]: testbed dpkg architecture: amd64 226s autopkgtest [18:31:05]: testbed apt version: 2.7.12 226s autopkgtest [18:31:05]: @@@@@@@@@@@@@@@@@@@@ test bed setup 226s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 226s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [449 kB] 226s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [4812 B] 226s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [40.4 kB] 226s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2790 kB] 226s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 Packages [606 kB] 226s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main i386 Packages [392 kB] 226s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 c-n-f Metadata [3508 B] 226s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 Packages [20.4 kB] 226s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/restricted i386 Packages [6700 B] 226s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 c-n-f Metadata [116 B] 226s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/universe i386 Packages [952 kB] 226s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 Packages [3214 kB] 226s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 c-n-f Metadata [9396 B] 226s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 Packages [51.5 kB] 226s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse i386 Packages [13.4 kB] 226s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 c-n-f Metadata [196 B] 229s Fetched 8671 kB in 1s (7065 kB/s) 229s Reading package lists... 230s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 230s Reading package lists... 236s Reading package lists... 236s Building dependency tree... 236s Reading state information... 237s Calculating upgrade... 237s The following packages will be REMOVED: 237s libhogweed6 libnettle8 libssl3 237s The following NEW packages will be installed: 237s libhogweed6t64 libnettle8t64 libssl3t64 237s The following packages will be upgraded: 237s console-setup console-setup-linux keyboard-configuration libgnutls30 237s libtirpc-common openssl 237s 6 upgraded, 3 newly installed, 3 to remove and 0 not upgraded. 237s Need to get 6475 kB of archives. 237s After this operation, 683 kB disk space will be freed. 237s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnettle8t64 amd64 3.9.1-2.2 [181 kB] 237s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libhogweed6t64 amd64 3.9.1-2.2 [199 kB] 237s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libgnutls30 amd64 3.8.3-1ubuntu2 [996 kB] 237s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 openssl amd64 3.0.13-0ubuntu1 [1003 kB] 237s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libssl3t64 amd64 3.0.13-0ubuntu1 [1886 kB] 237s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 console-setup-linux all 1.226ubuntu1 [1880 kB] 237s Get:7 http://ftpmaster.internal/ubuntu noble/main amd64 console-setup all 1.226ubuntu1 [110 kB] 237s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 keyboard-configuration all 1.226ubuntu1 [212 kB] 237s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtirpc-common all 1.3.4+ds-1.1 [8018 B] 237s Preconfiguring packages ... 238s Fetched 6475 kB in 0s (69.2 MB/s) 238s dpkg: libhogweed6:amd64: dependency problems, but removing anyway as you requested: 238s librtmp1:amd64 depends on libhogweed6. 238s libjcat1:amd64 depends on libhogweed6. 238s libgnutls30:amd64 depends on libhogweed6 (>= 3.6). 238s 238s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71820 files and directories currently installed.) 238s Removing libhogweed6:amd64 (3.9.1-2) ... 238s dpkg: libnettle8:amd64: dependency problems, but removing anyway as you requested: 238s librtmp1:amd64 depends on libnettle8. 238s libgnutls30:amd64 depends on libnettle8 (>= 3.9~). 238s libcurl3-gnutls:amd64 depends on libnettle8. 238s libarchive13:amd64 depends on libnettle8. 238s 238s Removing libnettle8:amd64 (3.9.1-2) ... 238s Selecting previously unselected package libnettle8t64:amd64. 238s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71808 files and directories currently installed.) 238s Preparing to unpack .../libnettle8t64_3.9.1-2.2_amd64.deb ... 238s Unpacking libnettle8t64:amd64 (3.9.1-2.2) ... 238s Setting up libnettle8t64:amd64 (3.9.1-2.2) ... 238s Selecting previously unselected package libhogweed6t64:amd64. 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71816 files and directories currently installed.) 239s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_amd64.deb ... 239s Unpacking libhogweed6t64:amd64 (3.9.1-2.2) ... 239s Setting up libhogweed6t64:amd64 (3.9.1-2.2) ... 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 239s Preparing to unpack .../libgnutls30_3.8.3-1ubuntu2_amd64.deb ... 239s Unpacking libgnutls30:amd64 (3.8.3-1ubuntu2) over (3.8.3-1ubuntu1) ... 239s Setting up libgnutls30:amd64 (3.8.3-1ubuntu2) ... 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 239s Preparing to unpack .../openssl_3.0.13-0ubuntu1_amd64.deb ... 239s Unpacking openssl (3.0.13-0ubuntu1) over (3.0.10-1ubuntu4) ... 239s dpkg: libssl3:amd64: dependency problems, but removing anyway as you requested: 239s wget depends on libssl3 (>= 3.0.0). 239s tnftp depends on libssl3 (>= 3.0.0). 239s tcpdump depends on libssl3 (>= 3.0.0). 239s systemd-resolved depends on libssl3 (>= 3.0.0). 239s systemd depends on libssl3 (>= 3.0.0). 239s sudo depends on libssl3 (>= 3.0.0). 239s sbsigntool depends on libssl3 (>= 3.0.0). 239s rsync depends on libssl3 (>= 3.0.0). 239s python3-cryptography depends on libssl3 (>= 3.0.0). 239s openssh-server depends on libssl3 (>= 3.0.10). 239s openssh-client depends on libssl3 (>= 3.0.10). 239s mokutil depends on libssl3 (>= 3.0.0). 239s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 239s libtss2-esys-3.0.2-0:amd64 depends on libssl3 (>= 3.0.0). 239s libsystemd-shared:amd64 depends on libssl3 (>= 3.0.0). 239s libssh-4:amd64 depends on libssl3 (>= 3.0.0). 239s libsasl2-modules:amd64 depends on libssl3 (>= 3.0.0). 239s libsasl2-2:amd64 depends on libssl3 (>= 3.0.0). 239s libpython3.12-minimal:amd64 depends on libssl3 (>= 3.0.0). 239s libpython3.11-minimal:amd64 depends on libssl3 (>= 3.0.0). 239s libnvme1 depends on libssl3 (>= 3.0.0). 239s libkrb5-3:amd64 depends on libssl3 (>= 3.0.0). 239s libkmod2:amd64 depends on libssl3 (>= 3.0.0). 239s libfido2-1:amd64 depends on libssl3 (>= 3.0.0). 239s libcurl4:amd64 depends on libssl3 (>= 3.0.0). 239s libcryptsetup12:amd64 depends on libssl3 (>= 3.0.0). 239s kmod depends on libssl3 (>= 3.0.0). 239s dhcpcd-base depends on libssl3 (>= 3.0.0). 239s coreutils depends on libssl3 (>= 3.0.0). 239s bind9-libs:amd64 depends on libssl3 (>= 3.0.0). 239s 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 239s Removing libssl3:amd64 (3.0.10-1ubuntu4) ... 239s Selecting previously unselected package libssl3t64:amd64. 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71811 files and directories currently installed.) 239s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu1_amd64.deb ... 239s Unpacking libssl3t64:amd64 (3.0.13-0ubuntu1) ... 239s Setting up libssl3t64:amd64 (3.0.13-0ubuntu1) ... 239s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71824 files and directories currently installed.) 239s Preparing to unpack .../console-setup-linux_1.226ubuntu1_all.deb ... 239s Unpacking console-setup-linux (1.226ubuntu1) over (1.223ubuntu2) ... 239s Preparing to unpack .../console-setup_1.226ubuntu1_all.deb ... 239s Unpacking console-setup (1.226ubuntu1) over (1.223ubuntu2) ... 239s Preparing to unpack .../keyboard-configuration_1.226ubuntu1_all.deb ... 239s Unpacking keyboard-configuration (1.226ubuntu1) over (1.223ubuntu2) ... 239s Preparing to unpack .../libtirpc-common_1.3.4+ds-1.1_all.deb ... 239s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 240s Setting up libtirpc-common (1.3.4+ds-1.1) ... 240s Setting up keyboard-configuration (1.226ubuntu1) ... 240s Your console font configuration will be updated the next time your system 240s boots. If you want to update it now, run 'setupcon' from a virtual console. 240s update-initramfs: deferring update (trigger activated) 240s Setting up openssl (3.0.13-0ubuntu1) ... 240s Setting up console-setup-linux (1.226ubuntu1) ... 242s Setting up console-setup (1.226ubuntu1) ... 242s update-initramfs: deferring update (trigger activated) 242s Processing triggers for man-db (2.12.0-3) ... 243s Processing triggers for libc-bin (2.39-0ubuntu2) ... 243s Processing triggers for initramfs-tools (0.142ubuntu20) ... 243s update-initramfs: Generating /boot/initrd.img-6.8.0-11-generic 243s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 252s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 252s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 252s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 252s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 253s Reading package lists... 253s Building dependency tree... 253s Reading state information... 253s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 254s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 254s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 254s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 254s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 254s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 259s Reading package lists... 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 259s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 259s Reading package lists... 260s Building dependency tree... 260s Reading state information... 260s Calculating upgrade... 261s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 261s Reading package lists... 261s Building dependency tree... 261s Reading state information... 261s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 261s autopkgtest [18:31:40]: rebooting testbed after setup commands that affected boot 445s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 449s autopkgtest [18:34:48]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 14 00:29:05 UTC 2024 450s autopkgtest [18:34:49]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 461s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu2 (dsc) [5319 B] 461s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu2 (tar) [7983 kB] 461s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu2 (asc) [833 B] 461s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu2 (diff) [48.6 kB] 461s gpgv: Signature made Tue Mar 12 20:34:31 2024 UTC 461s gpgv: using RSA key AC483F68DE728F43F2202FCA568D30F321B2133D 461s gpgv: issuer "steve.langasek@ubuntu.com" 461s gpgv: Can't check signature: No public key 461s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1.1ubuntu2.dsc: no acceptable signature found 461s autopkgtest [18:35:00]: testing package sssd version 2.9.4-1.1ubuntu2 462s autopkgtest [18:35:01]: build not needed 463s autopkgtest [18:35:02]: test ldap-user-group-ldap-auth: preparing testbed 468s Reading package lists... 469s Building dependency tree... 469s Reading state information... 469s Starting pkgProblemResolver with broken count: 0 469s Starting 2 pkgProblemResolver with broken count: 0 469s Done 469s The following additional packages will be installed: 469s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 469s libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 libdhash1t64 469s libevent-2.1-7 libgnutls30t64 libini-config5t64 libipa-hbac-dev 469s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 469s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 469s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 469s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 469s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 469s libtdb1 libtevent0t64 libtirpc3t64 libverto-libevent1 libverto1 libwbclient0 469s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 469s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 469s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 469s tcl-expect tcl8.6 469s Suggested packages: 469s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 469s gnutls-bin odbc-postgresql tdsodbc adcli libsasl2-modules-ldap 469s tcl-tclreadline 469s Recommended packages: 469s cracklib-runtime libsasl2-modules-gssapi-mit 469s | libsasl2-modules-gssapi-heimdal 470s The following packages will be REMOVED: 470s libgnutls30 libtirpc3 470s The following NEW packages will be installed: 470s autopkgtest-satdep expect ldap-utils libavahi-client3 libavahi-common-data 470s libavahi-common3 libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 470s libdhash1t64 libevent-2.1-7 libgnutls30t64 libini-config5t64 libipa-hbac-dev 470s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 470s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 470s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 470s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 470s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 470s libtdb1 libtevent0t64 libtirpc3t64 libverto-libevent1 libverto1 libwbclient0 470s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 470s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 470s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 470s tcl-expect tcl8.6 470s 0 upgraded, 67 newly installed, 2 to remove and 0 not upgraded. 470s Need to get 13.9 MB/13.9 MB of archives. 470s After this operation, 49.4 MB of additional disk space will be used. 470s Get:1 /tmp/autopkgtest.oAy9Sq/1-autopkgtest-satdep.deb autopkgtest-satdep amd64 0 [872 B] 470s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libgnutls30t64 amd64 3.8.3-1.1ubuntu2 [1094 kB] 470s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtirpc3t64 amd64 1.3.4+ds-1.1 [82.5 kB] 470s Get:4 http://ftpmaster.internal/ubuntu noble/main amd64 libltdl7 amd64 2.4.7-7 [40.5 kB] 470s Get:5 http://ftpmaster.internal/ubuntu noble/main amd64 libodbc2 amd64 2.3.12-1 [159 kB] 470s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 slapd amd64 2.6.7+dfsg-1~exp1ubuntu1 [1553 kB] 470s Get:7 http://ftpmaster.internal/ubuntu noble/main amd64 libtcl8.6 amd64 8.6.13+dfsg-2 [984 kB] 470s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 tcl8.6 amd64 8.6.13+dfsg-2 [14.7 kB] 470s Get:9 http://ftpmaster.internal/ubuntu noble/universe amd64 tcl-expect amd64 5.45.4-2build1 [105 kB] 470s Get:10 http://ftpmaster.internal/ubuntu noble/universe amd64 expect amd64 5.45.4-2build1 [137 kB] 470s Get:11 http://ftpmaster.internal/ubuntu noble/main amd64 ldap-utils amd64 2.6.7+dfsg-1~exp1ubuntu1 [153 kB] 470s Get:12 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common-data amd64 0.8-13ubuntu2 [29.5 kB] 470s Get:13 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common3 amd64 0.8-13ubuntu2 [23.5 kB] 470s Get:14 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-client3 amd64 0.8-13ubuntu2 [27.4 kB] 470s Get:15 http://ftpmaster.internal/ubuntu noble/main amd64 libbasicobjects0t64 amd64 0.6.2-2.1 [5826 B] 470s Get:16 http://ftpmaster.internal/ubuntu noble/main amd64 libcollection4t64 amd64 0.6.2-2.1 [22.7 kB] 470s Get:17 http://ftpmaster.internal/ubuntu noble/main amd64 libcrack2 amd64 2.9.6-5.1 [28.8 kB] 470s Get:18 http://ftpmaster.internal/ubuntu noble/main amd64 libdhash1t64 amd64 0.6.2-2.1 [8580 B] 470s Get:19 http://ftpmaster.internal/ubuntu noble/main amd64 libevent-2.1-7 amd64 2.1.12-stable-9 [144 kB] 470s Get:20 http://ftpmaster.internal/ubuntu noble/main amd64 libpath-utils1t64 amd64 0.6.2-2.1 [8758 B] 470s Get:21 http://ftpmaster.internal/ubuntu noble/main amd64 libref-array1t64 amd64 0.6.2-2.1 [7406 B] 470s Get:22 http://ftpmaster.internal/ubuntu noble/main amd64 libini-config5t64 amd64 0.6.2-2.1 [43.5 kB] 470s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libipa-hbac0t64 amd64 2.9.4-1.1ubuntu2 [17.2 kB] 470s Get:24 http://ftpmaster.internal/ubuntu noble/universe amd64 libjose0 amd64 11-3 [44.8 kB] 470s Get:25 http://ftpmaster.internal/ubuntu noble/main amd64 libverto-libevent1 amd64 0.3.1-1ubuntu5 [5962 B] 470s Get:26 http://ftpmaster.internal/ubuntu noble/main amd64 libverto1 amd64 0.3.1-1ubuntu5 [10.4 kB] 470s Get:27 http://ftpmaster.internal/ubuntu noble/main amd64 libkrad0 amd64 1.20.1-5build1 [22.2 kB] 470s Get:28 http://ftpmaster.internal/ubuntu noble/main amd64 libtalloc2 amd64 2.4.2-1 [27.2 kB] 470s Get:29 http://ftpmaster.internal/ubuntu noble/main amd64 libtdb1 amd64 1.4.10-1 [46.7 kB] 470s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtevent0t64 amd64 0.16.1-2 [42.5 kB] 470s Get:31 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libldb2 amd64 2:2.8.0+samba4.19.5+dfsg-4ubuntu2 [186 kB] 470s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnfsidmap1 amd64 1:2.6.4-3ubuntu3 [48.2 kB] 470s Get:33 http://ftpmaster.internal/ubuntu noble/universe amd64 libnss-sudo all 1.9.15p5-3ubuntu1 [14.9 kB] 470s Get:34 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality-common all 1.4.5-3 [7658 B] 470s Get:35 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality1 amd64 1.4.5-3 [13.4 kB] 470s Get:36 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-pwquality amd64 1.4.5-3 [11.7 kB] 470s Get:37 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libwbclient0 amd64 2:4.19.5+dfsg-4ubuntu2 [70.3 kB] 470s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 samba-libs amd64 2:4.19.5+dfsg-4ubuntu2 [6017 kB] 470s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsmbclient0 amd64 2:4.19.5+dfsg-4ubuntu2 [62.4 kB] 470s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnss-sss amd64 2.9.4-1.1ubuntu2 [31.3 kB] 470s Get:41 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libpam-sss amd64 2.9.4-1.1ubuntu2 [50.3 kB] 470s Get:42 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 python3-sss amd64 2.9.4-1.1ubuntu2 [46.8 kB] 470s Get:43 http://ftpmaster.internal/ubuntu noble/main amd64 libc-ares2 amd64 1.27.0-1 [73.6 kB] 470s Get:44 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-certmap0 amd64 2.9.4-1.1ubuntu2 [46.9 kB] 470s Get:45 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-idmap0 amd64 2.9.4-1.1ubuntu2 [21.5 kB] 470s Get:46 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-nss-idmap0 amd64 2.9.4-1.1ubuntu2 [30.1 kB] 470s Get:47 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-common amd64 2.9.4-1.1ubuntu2 [1139 kB] 470s Get:48 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 sssd-idp amd64 2.9.4-1.1ubuntu2 [27.4 kB] 470s Get:49 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 sssd-passkey amd64 2.9.4-1.1ubuntu2 [32.4 kB] 470s Get:50 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ad-common amd64 2.9.4-1.1ubuntu2 [77.1 kB] 470s Get:51 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-krb5-common amd64 2.9.4-1.1ubuntu2 [88.8 kB] 470s Get:52 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ad amd64 2.9.4-1.1ubuntu2 [135 kB] 470s Get:53 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ipa amd64 2.9.4-1.1ubuntu2 [221 kB] 470s Get:54 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-krb5 amd64 2.9.4-1.1ubuntu2 [14.5 kB] 470s Get:55 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ldap amd64 2.9.4-1.1ubuntu2 [31.3 kB] 470s Get:56 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-proxy amd64 2.9.4-1.1ubuntu2 [44.6 kB] 470s Get:57 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd amd64 2.9.4-1.1ubuntu2 [4118 B] 470s Get:58 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-dbus amd64 2.9.4-1.1ubuntu2 [104 kB] 470s Get:59 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 sssd-kcm amd64 2.9.4-1.1ubuntu2 [140 kB] 470s Get:60 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-tools amd64 2.9.4-1.1ubuntu2 [97.8 kB] 470s Get:61 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libipa-hbac-dev amd64 2.9.4-1.1ubuntu2 [6664 B] 470s Get:62 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-certmap-dev amd64 2.9.4-1.1ubuntu2 [5736 B] 470s Get:63 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-idmap-dev amd64 2.9.4-1.1ubuntu2 [8382 B] 470s Get:64 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-nss-idmap-dev amd64 2.9.4-1.1ubuntu2 [6714 B] 470s Get:65 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 libsss-sudo amd64 2.9.4-1.1ubuntu2 [21.0 kB] 470s Get:66 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 python3-libipa-hbac amd64 2.9.4-1.1ubuntu2 [16.8 kB] 470s Get:67 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 python3-libsss-nss-idmap amd64 2.9.4-1.1ubuntu2 [9194 B] 470s Preconfiguring packages ... 471s Fetched 13.9 MB in 0s (41.4 MB/s) 471s dpkg: libgnutls30:amd64: dependency problems, but removing anyway as you requested: 471s librtmp1:amd64 depends on libgnutls30 (>= 3.7.2). 471s libldap2:amd64 depends on libgnutls30 (>= 3.8.2). 471s libjcat1:amd64 depends on libgnutls30 (>= 3.7.3). 471s libcurl3-gnutls:amd64 depends on libgnutls30 (>= 3.8.2). 471s fwupd depends on libgnutls30 (>= 3.7.3). 471s dirmngr depends on libgnutls30 (>= 3.8.1). 471s apt depends on libgnutls30 (>= 3.8.1). 471s 471s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71824 files and directories currently installed.) 471s Removing libgnutls30:amd64 (3.8.3-1ubuntu2) ... 471s Selecting previously unselected package libgnutls30t64:amd64. 471s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71815 files and directories currently installed.) 471s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_amd64.deb ... 471s Unpacking libgnutls30t64:amd64 (3.8.3-1.1ubuntu2) ... 471s Setting up libgnutls30t64:amd64 (3.8.3-1.1ubuntu2) ... 471s dpkg: libtirpc3:amd64: dependency problems, but removing anyway as you requested: 471s lsof depends on libtirpc3 (>= 1.0.2). 471s libpython3.12-stdlib:amd64 depends on libtirpc3 (>= 1.0.2). 471s libpython3.11-stdlib:amd64 depends on libtirpc3 (>= 1.0.2). 471s libnsl2:amd64 depends on libtirpc3 (>= 1.0.2). 471s iproute2 depends on libtirpc3 (>= 1.0.2). 471s 471s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71843 files and directories currently installed.) 471s Removing libtirpc3:amd64 (1.3.4+ds-1build1) ... 471s Selecting previously unselected package libtirpc3t64:amd64. 471s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71837 files and directories currently installed.) 471s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_amd64.deb ... 471s Adding 'diversion of /lib/x86_64-linux-gnu/libtirpc.so.3 to /lib/x86_64-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 471s Adding 'diversion of /lib/x86_64-linux-gnu/libtirpc.so.3.0.0 to /lib/x86_64-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 471s Unpacking libtirpc3t64:amd64 (1.3.4+ds-1.1) ... 471s Selecting previously unselected package libltdl7:amd64. 471s Preparing to unpack .../01-libltdl7_2.4.7-7_amd64.deb ... 471s Unpacking libltdl7:amd64 (2.4.7-7) ... 471s Selecting previously unselected package libodbc2:amd64. 471s Preparing to unpack .../02-libodbc2_2.3.12-1_amd64.deb ... 471s Unpacking libodbc2:amd64 (2.3.12-1) ... 471s Selecting previously unselected package slapd. 471s Preparing to unpack .../03-slapd_2.6.7+dfsg-1~exp1ubuntu1_amd64.deb ... 471s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 471s Selecting previously unselected package libtcl8.6:amd64. 471s Preparing to unpack .../04-libtcl8.6_8.6.13+dfsg-2_amd64.deb ... 471s Unpacking libtcl8.6:amd64 (8.6.13+dfsg-2) ... 471s Selecting previously unselected package tcl8.6. 472s Preparing to unpack .../05-tcl8.6_8.6.13+dfsg-2_amd64.deb ... 472s Unpacking tcl8.6 (8.6.13+dfsg-2) ... 472s Selecting previously unselected package tcl-expect:amd64. 472s Preparing to unpack .../06-tcl-expect_5.45.4-2build1_amd64.deb ... 472s Unpacking tcl-expect:amd64 (5.45.4-2build1) ... 472s Selecting previously unselected package expect. 472s Preparing to unpack .../07-expect_5.45.4-2build1_amd64.deb ... 472s Unpacking expect (5.45.4-2build1) ... 472s Selecting previously unselected package ldap-utils. 472s Preparing to unpack .../08-ldap-utils_2.6.7+dfsg-1~exp1ubuntu1_amd64.deb ... 472s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 472s Selecting previously unselected package libavahi-common-data:amd64. 472s Preparing to unpack .../09-libavahi-common-data_0.8-13ubuntu2_amd64.deb ... 472s Unpacking libavahi-common-data:amd64 (0.8-13ubuntu2) ... 472s Selecting previously unselected package libavahi-common3:amd64. 472s Preparing to unpack .../10-libavahi-common3_0.8-13ubuntu2_amd64.deb ... 472s Unpacking libavahi-common3:amd64 (0.8-13ubuntu2) ... 472s Selecting previously unselected package libavahi-client3:amd64. 472s Preparing to unpack .../11-libavahi-client3_0.8-13ubuntu2_amd64.deb ... 472s Unpacking libavahi-client3:amd64 (0.8-13ubuntu2) ... 472s Selecting previously unselected package libbasicobjects0t64:amd64. 472s Preparing to unpack .../12-libbasicobjects0t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libbasicobjects0t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libcollection4t64:amd64. 472s Preparing to unpack .../13-libcollection4t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libcollection4t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libcrack2:amd64. 472s Preparing to unpack .../14-libcrack2_2.9.6-5.1_amd64.deb ... 472s Unpacking libcrack2:amd64 (2.9.6-5.1) ... 472s Selecting previously unselected package libdhash1t64:amd64. 472s Preparing to unpack .../15-libdhash1t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libdhash1t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libevent-2.1-7:amd64. 472s Preparing to unpack .../16-libevent-2.1-7_2.1.12-stable-9_amd64.deb ... 472s Unpacking libevent-2.1-7:amd64 (2.1.12-stable-9) ... 472s Selecting previously unselected package libpath-utils1t64:amd64. 472s Preparing to unpack .../17-libpath-utils1t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libpath-utils1t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libref-array1t64:amd64. 472s Preparing to unpack .../18-libref-array1t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libref-array1t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libini-config5t64:amd64. 472s Preparing to unpack .../19-libini-config5t64_0.6.2-2.1_amd64.deb ... 472s Unpacking libini-config5t64:amd64 (0.6.2-2.1) ... 472s Selecting previously unselected package libipa-hbac0t64. 472s Preparing to unpack .../20-libipa-hbac0t64_2.9.4-1.1ubuntu2_amd64.deb ... 472s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu2) ... 472s Selecting previously unselected package libjose0:amd64. 472s Preparing to unpack .../21-libjose0_11-3_amd64.deb ... 472s Unpacking libjose0:amd64 (11-3) ... 472s Selecting previously unselected package libverto-libevent1:amd64. 472s Preparing to unpack .../22-libverto-libevent1_0.3.1-1ubuntu5_amd64.deb ... 472s Unpacking libverto-libevent1:amd64 (0.3.1-1ubuntu5) ... 472s Selecting previously unselected package libverto1:amd64. 472s Preparing to unpack .../23-libverto1_0.3.1-1ubuntu5_amd64.deb ... 472s Unpacking libverto1:amd64 (0.3.1-1ubuntu5) ... 472s Selecting previously unselected package libkrad0:amd64. 472s Preparing to unpack .../24-libkrad0_1.20.1-5build1_amd64.deb ... 472s Unpacking libkrad0:amd64 (1.20.1-5build1) ... 472s Selecting previously unselected package libtalloc2:amd64. 472s Preparing to unpack .../25-libtalloc2_2.4.2-1_amd64.deb ... 472s Unpacking libtalloc2:amd64 (2.4.2-1) ... 472s Selecting previously unselected package libtdb1:amd64. 472s Preparing to unpack .../26-libtdb1_1.4.10-1_amd64.deb ... 472s Unpacking libtdb1:amd64 (1.4.10-1) ... 472s Selecting previously unselected package libtevent0t64:amd64. 472s Preparing to unpack .../27-libtevent0t64_0.16.1-2_amd64.deb ... 472s Unpacking libtevent0t64:amd64 (0.16.1-2) ... 472s Selecting previously unselected package libldb2:amd64. 472s Preparing to unpack .../28-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu2_amd64.deb ... 472s Unpacking libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 472s Selecting previously unselected package libnfsidmap1:amd64. 472s Preparing to unpack .../29-libnfsidmap1_1%3a2.6.4-3ubuntu3_amd64.deb ... 472s Unpacking libnfsidmap1:amd64 (1:2.6.4-3ubuntu3) ... 472s Selecting previously unselected package libnss-sudo. 472s Preparing to unpack .../30-libnss-sudo_1.9.15p5-3ubuntu1_all.deb ... 472s Unpacking libnss-sudo (1.9.15p5-3ubuntu1) ... 472s Selecting previously unselected package libpwquality-common. 472s Preparing to unpack .../31-libpwquality-common_1.4.5-3_all.deb ... 472s Unpacking libpwquality-common (1.4.5-3) ... 472s Selecting previously unselected package libpwquality1:amd64. 472s Preparing to unpack .../32-libpwquality1_1.4.5-3_amd64.deb ... 472s Unpacking libpwquality1:amd64 (1.4.5-3) ... 472s Selecting previously unselected package libpam-pwquality:amd64. 472s Preparing to unpack .../33-libpam-pwquality_1.4.5-3_amd64.deb ... 472s Unpacking libpam-pwquality:amd64 (1.4.5-3) ... 472s Selecting previously unselected package libwbclient0:amd64. 472s Preparing to unpack .../34-libwbclient0_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 472s Unpacking libwbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 472s Selecting previously unselected package samba-libs:amd64. 472s Preparing to unpack .../35-samba-libs_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 472s Unpacking samba-libs:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 473s Selecting previously unselected package libsmbclient0:amd64. 473s Preparing to unpack .../36-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 473s Unpacking libsmbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 473s Selecting previously unselected package libnss-sss:amd64. 473s Preparing to unpack .../37-libnss-sss_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libnss-sss:amd64 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libpam-sss:amd64. 473s Preparing to unpack .../38-libpam-sss_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libpam-sss:amd64 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package python3-sss. 473s Preparing to unpack .../39-python3-sss_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking python3-sss (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libc-ares2:amd64. 473s Preparing to unpack .../40-libc-ares2_1.27.0-1_amd64.deb ... 473s Unpacking libc-ares2:amd64 (1.27.0-1) ... 473s Selecting previously unselected package libsss-certmap0. 473s Preparing to unpack .../41-libsss-certmap0_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-idmap0. 473s Preparing to unpack .../42-libsss-idmap0_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-nss-idmap0. 473s Preparing to unpack .../43-libsss-nss-idmap0_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-common. 473s Preparing to unpack .../44-sssd-common_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-common (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-idp. 473s Preparing to unpack .../45-sssd-idp_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-idp (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-passkey. 473s Preparing to unpack .../46-sssd-passkey_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-passkey (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-ad-common. 473s Preparing to unpack .../47-sssd-ad-common_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-ad-common (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-krb5-common. 473s Preparing to unpack .../48-sssd-krb5-common_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-ad. 473s Preparing to unpack .../49-sssd-ad_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-ad (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-ipa. 473s Preparing to unpack .../50-sssd-ipa_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-ipa (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-krb5. 473s Preparing to unpack .../51-sssd-krb5_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-krb5 (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-ldap. 473s Preparing to unpack .../52-sssd-ldap_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-ldap (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-proxy. 473s Preparing to unpack .../53-sssd-proxy_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-proxy (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd. 473s Preparing to unpack .../54-sssd_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-dbus. 473s Preparing to unpack .../55-sssd-dbus_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-dbus (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-kcm. 473s Preparing to unpack .../56-sssd-kcm_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-kcm (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package sssd-tools. 473s Preparing to unpack .../57-sssd-tools_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking sssd-tools (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libipa-hbac-dev. 473s Preparing to unpack .../58-libipa-hbac-dev_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libipa-hbac-dev (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-certmap-dev. 473s Preparing to unpack .../59-libsss-certmap-dev_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-certmap-dev (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-idmap-dev. 473s Preparing to unpack .../60-libsss-idmap-dev_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-idmap-dev (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-nss-idmap-dev. 473s Preparing to unpack .../61-libsss-nss-idmap-dev_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-nss-idmap-dev (2.9.4-1.1ubuntu2) ... 473s Selecting previously unselected package libsss-sudo. 473s Preparing to unpack .../62-libsss-sudo_2.9.4-1.1ubuntu2_amd64.deb ... 473s Unpacking libsss-sudo (2.9.4-1.1ubuntu2) ... 474s Selecting previously unselected package python3-libipa-hbac. 474s Preparing to unpack .../63-python3-libipa-hbac_2.9.4-1.1ubuntu2_amd64.deb ... 474s Unpacking python3-libipa-hbac (2.9.4-1.1ubuntu2) ... 474s Selecting previously unselected package python3-libsss-nss-idmap. 474s Preparing to unpack .../64-python3-libsss-nss-idmap_2.9.4-1.1ubuntu2_amd64.deb ... 474s Unpacking python3-libsss-nss-idmap (2.9.4-1.1ubuntu2) ... 474s Selecting previously unselected package autopkgtest-satdep. 474s Preparing to unpack .../65-1-autopkgtest-satdep.deb ... 474s Unpacking autopkgtest-satdep (0) ... 474s Setting up libpwquality-common (1.4.5-3) ... 474s Setting up libnfsidmap1:amd64 (1:2.6.4-3ubuntu3) ... 474s Setting up libsss-idmap0 (2.9.4-1.1ubuntu2) ... 474s Setting up libbasicobjects0t64:amd64 (0.6.2-2.1) ... 474s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu2) ... 474s Setting up libtirpc3t64:amd64 (1.3.4+ds-1.1) ... 474s Setting up libsss-idmap-dev (2.9.4-1.1ubuntu2) ... 474s Setting up libref-array1t64:amd64 (0.6.2-2.1) ... 474s Setting up libipa-hbac-dev (2.9.4-1.1ubuntu2) ... 474s Setting up libtdb1:amd64 (1.4.10-1) ... 474s Setting up libcollection4t64:amd64 (0.6.2-2.1) ... 474s Setting up libc-ares2:amd64 (1.27.0-1) ... 474s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu1) ... 474s Setting up libjose0:amd64 (11-3) ... 474s Setting up libwbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 474s Setting up libtalloc2:amd64 (2.4.2-1) ... 474s Setting up libpath-utils1t64:amd64 (0.6.2-2.1) ... 474s Setting up libavahi-common-data:amd64 (0.8-13ubuntu2) ... 474s Setting up libdhash1t64:amd64 (0.6.2-2.1) ... 474s Setting up libevent-2.1-7:amd64 (2.1.12-stable-9) ... 474s Setting up libtcl8.6:amd64 (8.6.13+dfsg-2) ... 474s Setting up libltdl7:amd64 (2.4.7-7) ... 474s Setting up libcrack2:amd64 (2.9.6-5.1) ... 474s Setting up libodbc2:amd64 (2.3.12-1) ... 474s Setting up python3-libipa-hbac (2.9.4-1.1ubuntu2) ... 474s Setting up libnss-sudo (1.9.15p5-3ubuntu1) ... 474s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu2) ... 474s Setting up libini-config5t64:amd64 (0.6.2-2.1) ... 474s Setting up libtevent0t64:amd64 (0.16.1-2) ... 474s Setting up libnss-sss:amd64 (2.9.4-1.1ubuntu2) ... 474s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu1) ... 474s Creating new user openldap... done. 474s Creating initial configuration... done. 474s Creating LDAP directory... done. 475s Setting up tcl8.6 (8.6.13+dfsg-2) ... 475s Setting up libsss-sudo (2.9.4-1.1ubuntu2) ... 475s Setting up libsss-nss-idmap-dev (2.9.4-1.1ubuntu2) ... 475s Setting up libavahi-common3:amd64 (0.8-13ubuntu2) ... 475s Setting up tcl-expect:amd64 (5.45.4-2build1) ... 475s Setting up libsss-certmap0 (2.9.4-1.1ubuntu2) ... 475s Setting up libpwquality1:amd64 (1.4.5-3) ... 475s Setting up python3-libsss-nss-idmap (2.9.4-1.1ubuntu2) ... 475s Setting up libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 475s Setting up libavahi-client3:amd64 (0.8-13ubuntu2) ... 475s Setting up expect (5.45.4-2build1) ... 475s Setting up libpam-pwquality:amd64 (1.4.5-3) ... 475s Setting up samba-libs:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 475s Setting up libsss-certmap-dev (2.9.4-1.1ubuntu2) ... 475s Setting up python3-sss (2.9.4-1.1ubuntu2) ... 475s Setting up libsmbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 475s Setting up libpam-sss:amd64 (2.9.4-1.1ubuntu2) ... 475s Setting up sssd-common (2.9.4-1.1ubuntu2) ... 475s Creating SSSD system user & group... 475s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 475s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 475s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 475s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 476s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 476s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 476s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 477s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 477s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 477s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 477s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 478s sssd-autofs.service is a disabled or a static unit, not starting it. 478s sssd-nss.service is a disabled or a static unit, not starting it. 478s sssd-pam.service is a disabled or a static unit, not starting it. 478s sssd-ssh.service is a disabled or a static unit, not starting it. 478s sssd-sudo.service is a disabled or a static unit, not starting it. 478s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 478s Setting up sssd-proxy (2.9.4-1.1ubuntu2) ... 478s Setting up sssd-kcm (2.9.4-1.1ubuntu2) ... 478s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 478s sssd-kcm.service is a disabled or a static unit, not starting it. 478s Setting up sssd-dbus (2.9.4-1.1ubuntu2) ... 479s sssd-ifp.service is a disabled or a static unit, not starting it. 479s Setting up sssd-ad-common (2.9.4-1.1ubuntu2) ... 479s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 479s sssd-pac.service is a disabled or a static unit, not starting it. 479s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 479s Setting up sssd-krb5-common (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-krb5 (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-ldap (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-ad (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-tools (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-ipa (2.9.4-1.1ubuntu2) ... 479s Setting up sssd (2.9.4-1.1ubuntu2) ... 479s Setting up libverto-libevent1:amd64 (0.3.1-1ubuntu5) ... 479s Setting up libverto1:amd64 (0.3.1-1ubuntu5) ... 479s Setting up libkrad0:amd64 (1.20.1-5build1) ... 479s Setting up sssd-passkey (2.9.4-1.1ubuntu2) ... 479s Setting up sssd-idp (2.9.4-1.1ubuntu2) ... 479s Setting up autopkgtest-satdep (0) ... 479s Processing triggers for libc-bin (2.39-0ubuntu2) ... 479s Processing triggers for ufw (0.36.2-5) ... 480s Processing triggers for man-db (2.12.0-3) ... 481s Processing triggers for dbus (1.14.10-4ubuntu1) ... 486s (Reading database ... 73140 files and directories currently installed.) 486s Removing autopkgtest-satdep (0) ... 487s autopkgtest [18:35:26]: test ldap-user-group-ldap-auth: [----------------------- 487s + . debian/tests/util 487s + . debian/tests/common-tests 487s + mydomain=example.com 487s + myhostname=ldap.example.com 487s + mysuffix=dc=example,dc=com 487s + admin_dn=cn=admin,dc=example,dc=com 487s + admin_pw=secret 487s + ldap_user=testuser1 487s + ldap_user_pw=testuser1secret 487s + ldap_group=ldapusers 487s + adjust_hostname ldap.example.com 487s + local myhostname=ldap.example.com 487s + echo ldap.example.com 487s + hostname ldap.example.com 487s + grep -qE ldap.example.com /etc/hosts 487s + echo 127.0.1.10 ldap.example.com 487s + reconfigure_slapd 487s + debconf-set-selections 487s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 487s + dpkg-reconfigure -fnoninteractive -pcritical slapd 487s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 487s Moving old database directory to /var/backups: 487s - directory unknown... done. 487s Creating initial configuration... done. 487s Creating LDAP directory... done. 488s + generate_certs ldap.example.com 488s + local cn=ldap.example.com 488s + local cert=/etc/ldap/server.pem 488s + local key=/etc/ldap/server.key 488s + local cnf=/etc/ldap/openssl.cnf 488s + cat 488s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 488s ................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 488s ..........++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 488s ----- 488s + chmod 0640 /etc/ldap/server.key 488s + chgrp openldap /etc/ldap/server.key 488s + [ ! -f /etc/ldap/server.pem ] 488s + [ ! -f /etc/ldap/server.key ] 488s + enable_ldap_ssl 488s + cat 488s + cat 488s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 488s modifying entry "cn=config" 488s 488s + populate_ldap_rfc2307 488s + cat 488s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 488s adding new entry "ou=People,dc=example,dc=com" 488s 488s adding new entry "ou=Group,dc=example,dc=com" 488s 488s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 488s 488s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 488s 488s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 488s 488s + configure_sssd_ldap_rfc2307 488s + cat 488s + chmod 0600 /etc/sssd/sssd.conf 488s + systemctl restart sssd 488s + enable_pam_mkhomedir 488s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 488s + echo session optional pam_mkhomedir.so 488s + run_common_tests 488s + echo Assert local user databases do not have our LDAP test data 488s + check_local_user testuser1 488s + local local_user=testuser1 488s + grep -q ^testuser1 /etc/passwd 488s + check_local_group testuser1 488s + local local_group=testuser1 488s + grep -q ^testuser1 /etc/group 488s + check_local_group ldapusers 488s + local local_group=ldapusers 488s + grep -q ^ldapusers /etc/group 488s Assert local user databases do not have our LDAP test data 488s + echo The LDAP user is known to the system via getent 488s The LDAP user is known to the system via getent 488s + check_getent_user testuser1 488s + local getent_user=testuser1 488s + local output 488s + getent passwd testuser1 488s The LDAP user's private group is known to the system via getent 488s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 488s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 488s + echo The LDAP user's private group is known to the system via getent 488s + check_getent_group testuser1 488s + local getent_group=testuser1 488s + local output 488s + getent group testuser1 488s The LDAP group ldapusers is known to the system via getent 488s + output=testuser1:*:10001:testuser1 488s + [ -z testuser1:*:10001:testuser1 ] 488s + echo The LDAP group ldapusers is known to the system via getent 488s + check_getent_group ldapusers 488s + local getent_group=ldapusers 488s + local output 488s + getent group ldapusers 488s The id(1) command can resolve the group membership of the LDAP user 488s + output=ldapusers:*:10100:testuser1 488s + [ -z ldapusers:*:10100:testuser1 ] 488s + echo The id(1) command can resolve the group membership of the LDAP user 488s + id -Gn testuser1 488s The LDAP user can login on a terminal 488s + output=testuser1 ldapusers 488s + [ testuser1 ldapusers != testuser1 ldapusers ] 488s + echo The LDAP user can login on a terminal 488s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 488s spawn login 488s ldap.example.com login: testuser1 488s Password: 488s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic x86_64) 488s 488s * Documentation: https://help.ubuntu.com 488s * Management: https://landscape.canonical.com 488s * Support: https://ubuntu.com/pro 488s 488s 488s The programs included with the Ubuntu system are free software; 488s the exact distribution terms for each program are described in the 488s individual files in /usr/share/doc/*/copyright. 488s 488s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 488s applicable law. 488s 488s 488s The programs included with the Ubuntu system are free software; 488s the exact distribution terms for each program are described in the 488s individual files in /usr/share/doc/*/copyright. 488s 488s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 488s applicable law. 488s 488s Creating directory '/home/testuser1'. 488s [?2004htestuser1@ldap:~$ id -un 488s [?2004l testuser1 488s [?2004htestuser1@ldap:~$ autopkgtest [18:35:27]: test ldap-user-group-ldap-auth: -----------------------] 489s autopkgtest [18:35:28]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 489s ldap-user-group-ldap-auth PASS 489s autopkgtest [18:35:28]: test ldap-user-group-krb5-auth: preparing testbed 493s Reading package lists... 493s Building dependency tree... 493s Reading state information... 494s Starting pkgProblemResolver with broken count: 0 494s Starting 2 pkgProblemResolver with broken count: 0 494s Done 494s The following additional packages will be installed: 494s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4 494s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 494s Suggested packages: 494s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 494s The following NEW packages will be installed: 494s autopkgtest-satdep krb5-admin-server krb5-config krb5-kdc krb5-user 494s libgssrpc4 libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10 494s 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded. 494s Need to get 598 kB/599 kB of archives. 494s After this operation, 2107 kB of additional disk space will be used. 494s Get:1 /tmp/autopkgtest.oAy9Sq/2-autopkgtest-satdep.deb autopkgtest-satdep amd64 0 [888 B] 494s Get:2 http://ftpmaster.internal/ubuntu noble/main amd64 krb5-config all 2.7 [22.0 kB] 494s Get:3 http://ftpmaster.internal/ubuntu noble/main amd64 libgssrpc4 amd64 1.20.1-5build1 [57.0 kB] 494s Get:4 http://ftpmaster.internal/ubuntu noble/main amd64 libkadm5clnt-mit12 amd64 1.20.1-5build1 [40.2 kB] 494s Get:5 http://ftpmaster.internal/ubuntu noble/main amd64 libkdb5-10 amd64 1.20.1-5build1 [39.9 kB] 494s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 libkadm5srv-mit12 amd64 1.20.1-5build1 [53.2 kB] 494s Get:7 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-user amd64 1.20.1-5build1 [109 kB] 494s Get:8 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-kdc amd64 1.20.1-5build1 [180 kB] 494s Get:9 http://ftpmaster.internal/ubuntu noble/universe amd64 krb5-admin-server amd64 1.20.1-5build1 [96.5 kB] 495s Preconfiguring packages ... 496s Fetched 598 kB in 0s (6024 kB/s) 496s Selecting previously unselected package krb5-config. 496s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73140 files and directories currently installed.) 496s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 496s Unpacking krb5-config (2.7) ... 496s Selecting previously unselected package libgssrpc4:amd64. 496s Preparing to unpack .../1-libgssrpc4_1.20.1-5build1_amd64.deb ... 496s Unpacking libgssrpc4:amd64 (1.20.1-5build1) ... 496s Selecting previously unselected package libkadm5clnt-mit12:amd64. 496s Preparing to unpack .../2-libkadm5clnt-mit12_1.20.1-5build1_amd64.deb ... 496s Unpacking libkadm5clnt-mit12:amd64 (1.20.1-5build1) ... 496s Selecting previously unselected package libkdb5-10:amd64. 496s Preparing to unpack .../3-libkdb5-10_1.20.1-5build1_amd64.deb ... 496s Unpacking libkdb5-10:amd64 (1.20.1-5build1) ... 496s Selecting previously unselected package libkadm5srv-mit12:amd64. 496s Preparing to unpack .../4-libkadm5srv-mit12_1.20.1-5build1_amd64.deb ... 496s Unpacking libkadm5srv-mit12:amd64 (1.20.1-5build1) ... 496s Selecting previously unselected package krb5-user. 496s Preparing to unpack .../5-krb5-user_1.20.1-5build1_amd64.deb ... 496s Unpacking krb5-user (1.20.1-5build1) ... 496s Selecting previously unselected package krb5-kdc. 496s Preparing to unpack .../6-krb5-kdc_1.20.1-5build1_amd64.deb ... 496s Unpacking krb5-kdc (1.20.1-5build1) ... 496s Selecting previously unselected package krb5-admin-server. 496s Preparing to unpack .../7-krb5-admin-server_1.20.1-5build1_amd64.deb ... 496s Unpacking krb5-admin-server (1.20.1-5build1) ... 496s Selecting previously unselected package autopkgtest-satdep. 496s Preparing to unpack .../8-2-autopkgtest-satdep.deb ... 496s Unpacking autopkgtest-satdep (0) ... 496s Setting up libgssrpc4:amd64 (1.20.1-5build1) ... 496s Setting up krb5-config (2.7) ... 496s Setting up libkadm5clnt-mit12:amd64 (1.20.1-5build1) ... 496s Setting up libkdb5-10:amd64 (1.20.1-5build1) ... 496s Setting up libkadm5srv-mit12:amd64 (1.20.1-5build1) ... 496s Setting up krb5-user (1.20.1-5build1) ... 496s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 496s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 496s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 496s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 496s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 496s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 496s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 496s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 496s Setting up krb5-kdc (1.20.1-5build1) ... 497s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 497s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 497s Setting up krb5-admin-server (1.20.1-5build1) ... 498s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 498s Setting up autopkgtest-satdep (0) ... 498s Processing triggers for man-db (2.12.0-3) ... 499s Processing triggers for libc-bin (2.39-0ubuntu2) ... 503s (Reading database ... 73233 files and directories currently installed.) 503s Removing autopkgtest-satdep (0) ... 503s autopkgtest [18:35:42]: test ldap-user-group-krb5-auth: [----------------------- 503s + . debian/tests/util 503s + . debian/tests/common-tests 503s + mydomain=example.com 503s + myhostname=ldap.example.com 503s + mysuffix=dc=example,dc=com 503s + myrealm=EXAMPLE.COM 503s + admin_dn=cn=admin,dc=example,dc=com 503s + admin_pw=secret 503s + ldap_user=testuser1 503s + ldap_user_pw=testuser1secret 503s + kerberos_principal_pw=testuser1kerberos 503s + ldap_group=ldapusers 503s + adjust_hostname ldap.example.com 503s + local myhostname=ldap.example.com 503s + echo ldap.example.com 503s + hostname ldap.example.com 503s + grep -qE ldap.example.com /etc/hosts 503s + reconfigure_slapd 503s + debconf-set-selections 503s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu1-20240313-183526.ldapdb 503s + dpkg-reconfigure -fnoninteractive -pcritical slapd 503s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu1... done. 503s Moving old database directory to /var/backups: 503s - directory unknown... done. 503s Creating initial configuration... done. 503s Creating LDAP directory... done. 504s + generate_certs ldap.example.com 504s + local cn=ldap.example.com 504s + local cert=/etc/ldap/server.pem 504s + local key=/etc/ldap/server.key 504s + local cnf=/etc/ldap/openssl.cnf 504s + cat 504s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 504s ..............................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 504s ...++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 504s ----- 504s + chmod 0640 /etc/ldap/server.key 504s + chgrp openldap /etc/ldap/server.key 504s + [ ! -f /etc/ldap/server.pem ] 504s + [ ! -f /etc/ldap/server.key ] 504s + enable_ldap_ssl 504s + cat 504s + cat 504s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 504s modifying entry "cn=config" 504s 504s + populate_ldap_rfc2307 504s + cat 504s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 504s adding new entry "ou=People,dc=example,dc=com" 504s 504s adding new entry "ou=Group,dc=example,dc=com" 504s 504s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 504s 504s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 504s 504s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 504s 504s + create_realm EXAMPLE.COM ldap.example.com 504s + local realm_name=EXAMPLE.COM 504s + local kerberos_server=ldap.example.com 504s + rm -rf /var/lib/krb5kdc/* 504s + rm -rf /etc/krb5kdc/kdc.conf 504s + rm -f /etc/krb5.keytab 504s + cat 504s + cat 504s + echo # */admin * 504s + kdb5_util create -s -P secretpassword 504s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 504s master key name 'K/M@EXAMPLE.COM' 504s + systemctl restart krb5-kdc.service krb5-admin-server.service 504s + create_krb_principal testuser1 testuser1kerberos 504s + local principal=testuser1 504s + local password=testuser1kerberos 504s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 504s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 504s Authenticating as principal root/admin@EXAMPLE.COM with password. 504s Principal "testuser1@EXAMPLE.COM" created. 504s + configure_sssd_ldap_rfc2307_krb5_auth 504s + cat 504s + chmod 0600 /etc/sssd/sssd.conf 504s + systemctl restart sssd 504s + enable_pam_mkhomedir 504s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 504s + run_common_tests 504s + echo Assert local user databases do not have our LDAP test data 504s Assert local user databases do not have our LDAP test data 504s + check_local_user testuser1 504s + local local_user=testuser1 504s + grep -q ^testuser1 /etc/passwd 504s + check_local_group testuser1 504s + local local_group=testuser1 504s + grep -q ^testuser1 /etc/group 504s + check_local_group ldapusers 504s + local local_group=ldapusers 504s + grep -q ^ldapusers /etc/group 504s + echo The LDAP user is known to the system via getent 504s + check_getent_user testuser1 504s + local getent_user=testuser1 504s + local output 504s + getentThe LDAP user is known to the system via getent 504s passwd testuser1 504s The LDAP user's private group is known to the system via getent 504s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 504s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 504s + echo The LDAP user's private group is known to the system via getent 504s + check_getent_group testuser1 504s + local getent_group=testuser1 504s + local output 504s + getent group testuser1 504s + output=testuser1:*:10001:testuser1 504s The LDAP group ldapusers is known to the system via getent 504s + [ -z testuser1:*:10001:testuser1 ] 504s + echo The LDAP group ldapusers is known to the system via getent 504s + check_getent_group ldapusers 504s + local getent_group=ldapusers 504s + local output 504s + getent group ldapusers 504s + output=ldapusers:*:10100:testuser1 504s + [ -z ldapusers:*:10100:testuser1 ] 504s + echo The id(1) command can resolve the group membership of the LDAP user 504s + id -Gn testuser1 504s The id(1) command can resolve the group membership of the LDAP user 504s The Kerberos principal can login on a terminal 504s + output=testuser1 ldapusers 504s + [ testuser1 ldapusers != testuser1 ldapusers ] 504s + echo The Kerberos principal can login on a terminal 504s + kdestroy 504s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 504s spawn login 504s ldap.example.com login: testuser1 504s Password: 505s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic x86_64) 505s 505s * Documentation: https://help.ubuntu.com 505s * Management: https://landscape.canonical.com 505s * Support: https://ubuntu.com/pro 505s 505s 505s The programs included with the Ubuntu system are free software; 505s the exact distribution terms for each program are described in the 505s individual files in /usr/share/doc/*/copyright. 505s 505s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 505s applicable law. 505s 505s Last login: Wed Mar 13 18:35:27 UTC 2024 on pts/0 505s [?2004htestuser1@ldap:~$ id -un 505s [?2004l testuser1 505s [?2004htestuser1@ldap:~$ klist 505s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_t79SzI 505s Default principal: testuser1@EXAMPLE.COM 505s 505s Valid starting Expires Service principal 505s 03/13/24 18:35:43 03/14/24 04:35:43 krbtgt/EXAMPLE.COM@EXAMPLE.COM 505s renew until 03/14/24 18:35:43 505s [?2004hautopkgtest [18:35:44]: test ldap-user-group-krb5-auth: -----------------------] 505s autopkgtest [18:35:44]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 505s ldap-user-group-krb5-auth PASS 505s autopkgtest [18:35:44]: test sssd-softhism2-certificates-tests.sh: preparing testbed 726s autopkgtest [18:39:25]: testbed dpkg architecture: amd64 726s autopkgtest [18:39:25]: testbed apt version: 2.7.12 726s autopkgtest [18:39:25]: @@@@@@@@@@@@@@@@@@@@ test bed setup 726s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 727s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [4812 B] 727s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [40.4 kB] 727s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2791 kB] 727s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [450 kB] 727s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main i386 Packages [393 kB] 727s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 Packages [607 kB] 727s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 c-n-f Metadata [3508 B] 727s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 Packages [20.4 kB] 727s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/restricted i386 Packages [6700 B] 727s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/restricted amd64 c-n-f Metadata [116 B] 727s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/universe i386 Packages [950 kB] 727s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 Packages [3213 kB] 727s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 c-n-f Metadata [9396 B] 727s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 Packages [51.5 kB] 727s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/multiverse i386 Packages [13.4 kB] 727s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/multiverse amd64 c-n-f Metadata [196 B] 731s Fetched 8670 kB in 1s (5990 kB/s) 731s Reading package lists... 731s Hit:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease 731s Reading package lists... 737s Reading package lists... 738s Building dependency tree... 738s Reading state information... 738s Calculating upgrade... 738s The following packages will be REMOVED: 738s libhogweed6 libnettle8 libssl3 738s The following NEW packages will be installed: 738s libhogweed6t64 libnettle8t64 libssl3t64 738s The following packages will be upgraded: 738s console-setup console-setup-linux keyboard-configuration libgnutls30 738s libtirpc-common openssl 738s 6 upgraded, 3 newly installed, 3 to remove and 0 not upgraded. 738s Need to get 6475 kB of archives. 738s After this operation, 683 kB disk space will be freed. 738s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnettle8t64 amd64 3.9.1-2.2 [181 kB] 738s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libhogweed6t64 amd64 3.9.1-2.2 [199 kB] 738s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libgnutls30 amd64 3.8.3-1ubuntu2 [996 kB] 738s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 openssl amd64 3.0.13-0ubuntu1 [1003 kB] 739s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libssl3t64 amd64 3.0.13-0ubuntu1 [1886 kB] 739s Get:6 http://ftpmaster.internal/ubuntu noble/main amd64 console-setup-linux all 1.226ubuntu1 [1880 kB] 739s Get:7 http://ftpmaster.internal/ubuntu noble/main amd64 console-setup all 1.226ubuntu1 [110 kB] 739s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 keyboard-configuration all 1.226ubuntu1 [212 kB] 739s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtirpc-common all 1.3.4+ds-1.1 [8018 B] 739s Preconfiguring packages ... 739s Fetched 6475 kB in 0s (47.9 MB/s) 739s dpkg: libhogweed6:amd64: dependency problems, but removing anyway as you requested: 739s librtmp1:amd64 depends on libhogweed6. 739s libjcat1:amd64 depends on libhogweed6. 739s libgnutls30:amd64 depends on libhogweed6 (>= 3.6). 739s 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71820 files and directories currently installed.) 740s Removing libhogweed6:amd64 (3.9.1-2) ... 740s dpkg: libnettle8:amd64: dependency problems, but removing anyway as you requested: 740s librtmp1:amd64 depends on libnettle8. 740s libgnutls30:amd64 depends on libnettle8 (>= 3.9~). 740s libcurl3-gnutls:amd64 depends on libnettle8. 740s libarchive13:amd64 depends on libnettle8. 740s 740s Removing libnettle8:amd64 (3.9.1-2) ... 740s Selecting previously unselected package libnettle8t64:amd64. 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71808 files and directories currently installed.) 740s Preparing to unpack .../libnettle8t64_3.9.1-2.2_amd64.deb ... 740s Unpacking libnettle8t64:amd64 (3.9.1-2.2) ... 740s Setting up libnettle8t64:amd64 (3.9.1-2.2) ... 740s Selecting previously unselected package libhogweed6t64:amd64. 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71816 files and directories currently installed.) 740s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_amd64.deb ... 740s Unpacking libhogweed6t64:amd64 (3.9.1-2.2) ... 740s Setting up libhogweed6t64:amd64 (3.9.1-2.2) ... 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 740s Preparing to unpack .../libgnutls30_3.8.3-1ubuntu2_amd64.deb ... 740s Unpacking libgnutls30:amd64 (3.8.3-1ubuntu2) over (3.8.3-1ubuntu1) ... 740s Setting up libgnutls30:amd64 (3.8.3-1ubuntu2) ... 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 740s Preparing to unpack .../openssl_3.0.13-0ubuntu1_amd64.deb ... 740s Unpacking openssl (3.0.13-0ubuntu1) over (3.0.10-1ubuntu4) ... 740s dpkg: libssl3:amd64: dependency problems, but removing anyway as you requested: 740s wget depends on libssl3 (>= 3.0.0). 740s tnftp depends on libssl3 (>= 3.0.0). 740s tcpdump depends on libssl3 (>= 3.0.0). 740s systemd-resolved depends on libssl3 (>= 3.0.0). 740s systemd depends on libssl3 (>= 3.0.0). 740s sudo depends on libssl3 (>= 3.0.0). 740s sbsigntool depends on libssl3 (>= 3.0.0). 740s rsync depends on libssl3 (>= 3.0.0). 740s python3-cryptography depends on libssl3 (>= 3.0.0). 740s openssh-server depends on libssl3 (>= 3.0.10). 740s openssh-client depends on libssl3 (>= 3.0.10). 740s mokutil depends on libssl3 (>= 3.0.0). 740s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 740s libtss2-esys-3.0.2-0:amd64 depends on libssl3 (>= 3.0.0). 740s libsystemd-shared:amd64 depends on libssl3 (>= 3.0.0). 740s libssh-4:amd64 depends on libssl3 (>= 3.0.0). 740s libsasl2-modules:amd64 depends on libssl3 (>= 3.0.0). 740s libsasl2-2:amd64 depends on libssl3 (>= 3.0.0). 740s libpython3.12-minimal:amd64 depends on libssl3 (>= 3.0.0). 740s libpython3.11-minimal:amd64 depends on libssl3 (>= 3.0.0). 740s libnvme1 depends on libssl3 (>= 3.0.0). 740s libkrb5-3:amd64 depends on libssl3 (>= 3.0.0). 740s libkmod2:amd64 depends on libssl3 (>= 3.0.0). 740s libfido2-1:amd64 depends on libssl3 (>= 3.0.0). 740s libcurl4:amd64 depends on libssl3 (>= 3.0.0). 740s libcryptsetup12:amd64 depends on libssl3 (>= 3.0.0). 740s kmod depends on libssl3 (>= 3.0.0). 740s dhcpcd-base depends on libssl3 (>= 3.0.0). 740s coreutils depends on libssl3 (>= 3.0.0). 740s bind9-libs:amd64 depends on libssl3 (>= 3.0.0). 740s 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71822 files and directories currently installed.) 740s Removing libssl3:amd64 (3.0.10-1ubuntu4) ... 740s Selecting previously unselected package libssl3t64:amd64. 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71811 files and directories currently installed.) 740s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu1_amd64.deb ... 740s Unpacking libssl3t64:amd64 (3.0.13-0ubuntu1) ... 740s Setting up libssl3t64:amd64 (3.0.13-0ubuntu1) ... 740s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71824 files and directories currently installed.) 741s Preparing to unpack .../console-setup-linux_1.226ubuntu1_all.deb ... 741s Unpacking console-setup-linux (1.226ubuntu1) over (1.223ubuntu2) ... 741s Preparing to unpack .../console-setup_1.226ubuntu1_all.deb ... 741s Unpacking console-setup (1.226ubuntu1) over (1.223ubuntu2) ... 741s Preparing to unpack .../keyboard-configuration_1.226ubuntu1_all.deb ... 741s Unpacking keyboard-configuration (1.226ubuntu1) over (1.223ubuntu2) ... 741s Preparing to unpack .../libtirpc-common_1.3.4+ds-1.1_all.deb ... 741s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 741s Setting up libtirpc-common (1.3.4+ds-1.1) ... 741s Setting up keyboard-configuration (1.226ubuntu1) ... 742s Your console font configuration will be updated the next time your system 742s boots. If you want to update it now, run 'setupcon' from a virtual console. 742s update-initramfs: deferring update (trigger activated) 742s Setting up openssl (3.0.13-0ubuntu1) ... 742s Setting up console-setup-linux (1.226ubuntu1) ... 743s Setting up console-setup (1.226ubuntu1) ... 744s update-initramfs: deferring update (trigger activated) 744s Processing triggers for man-db (2.12.0-3) ... 745s Processing triggers for libc-bin (2.39-0ubuntu2) ... 745s Processing triggers for initramfs-tools (0.142ubuntu20) ... 745s update-initramfs: Generating /boot/initrd.img-6.8.0-11-generic 745s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 753s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 753s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 753s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 753s Reading package lists... 754s Building dependency tree... 754s Reading state information... 754s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 754s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 754s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 754s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 754s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 754s Hit:5 http://ftpmaster.internal/ubuntu noble-backports InRelease 760s Reading package lists... 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:1 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:2 and /etc/apt/sources.list.d/ubuntu.sources:1 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list:3 and /etc/apt/sources.list.d/ubuntu.sources:2 760s W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (main/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (main/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (universe/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (universe/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (universe/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (restricted/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (restricted/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (restricted/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target Packages (multiverse/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (multiverse/cnf/Commands-amd64) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s W: Target CNF (multiverse/cnf/Commands-all) is configured multiple times in /etc/apt/sources.list.d/proposed.list:1 and /etc/apt/sources.list.d/proposed.sources:1 760s Reading package lists... 761s Building dependency tree... 761s Reading state information... 761s Calculating upgrade... 761s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 762s Reading package lists... 762s Building dependency tree... 762s Reading state information... 762s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 762s autopkgtest [18:40:01]: rebooting testbed after setup commands that affected boot 931s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 946s Reading package lists... 946s Building dependency tree... 946s Reading state information... 946s Starting pkgProblemResolver with broken count: 0 946s Starting 2 pkgProblemResolver with broken count: 0 946s Done 946s The following additional packages will be installed: 946s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 946s libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 libdhash1t64 946s libevent-2.1-7 libgnutls-dane0t64 libgnutls30t64 libini-config5t64 946s libipa-hbac0t64 libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 946s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 946s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 946s libtalloc2 libtdb1 libtevent0t64 libtirpc3t64 libunbound8 libwbclient0 946s python3-sss samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common 946s sssd-common sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 946s Suggested packages: 946s dns-root-data adcli libsss-sudo sssd-tools libsasl2-modules-ldap 946s Recommended packages: 946s cracklib-runtime libsasl2-modules-gssapi-mit 946s | libsasl2-modules-gssapi-heimdal ldap-utils 947s The following packages will be REMOVED: 947s libgnutls30 libtirpc3 947s The following NEW packages will be installed: 947s autopkgtest-satdep gnutls-bin libavahi-client3 libavahi-common-data 947s libavahi-common3 libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 947s libdhash1t64 libevent-2.1-7 libgnutls-dane0t64 libgnutls30t64 947s libini-config5t64 libipa-hbac0t64 libldb2 libnfsidmap1 libnss-sss 947s libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 947s libpwquality1 libref-array1t64 libsmbclient0 libsofthsm2 libsss-certmap0 947s libsss-idmap0 libsss-nss-idmap0 libtalloc2 libtdb1 libtevent0t64 947s libtirpc3t64 libunbound8 libwbclient0 python3-sss samba-libs softhsm2 947s softhsm2-common sssd sssd-ad sssd-ad-common sssd-common sssd-ipa sssd-krb5 947s sssd-krb5-common sssd-ldap sssd-proxy 947s 0 upgraded, 48 newly installed, 2 to remove and 0 not upgraded. 947s Need to get 11.3 MB/11.3 MB of archives. 947s After this operation, 39.8 MB of additional disk space will be used. 947s Get:1 /tmp/autopkgtest.oAy9Sq/3-autopkgtest-satdep.deb autopkgtest-satdep amd64 0 [748 B] 947s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libgnutls30t64 amd64 3.8.3-1.1ubuntu2 [1094 kB] 947s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtirpc3t64 amd64 1.3.4+ds-1.1 [82.5 kB] 947s Get:4 http://ftpmaster.internal/ubuntu noble/main amd64 libevent-2.1-7 amd64 2.1.12-stable-9 [144 kB] 947s Get:5 http://ftpmaster.internal/ubuntu noble/main amd64 libunbound8 amd64 1.19.1-1ubuntu1 [440 kB] 947s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libgnutls-dane0t64 amd64 3.8.3-1.1ubuntu2 [33.1 kB] 947s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/universe amd64 gnutls-bin amd64 3.8.3-1.1ubuntu2 [279 kB] 947s Get:8 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common-data amd64 0.8-13ubuntu2 [29.5 kB] 947s Get:9 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-common3 amd64 0.8-13ubuntu2 [23.5 kB] 947s Get:10 http://ftpmaster.internal/ubuntu noble/main amd64 libavahi-client3 amd64 0.8-13ubuntu2 [27.4 kB] 947s Get:11 http://ftpmaster.internal/ubuntu noble/main amd64 libbasicobjects0t64 amd64 0.6.2-2.1 [5826 B] 947s Get:12 http://ftpmaster.internal/ubuntu noble/main amd64 libcollection4t64 amd64 0.6.2-2.1 [22.7 kB] 947s Get:13 http://ftpmaster.internal/ubuntu noble/main amd64 libcrack2 amd64 2.9.6-5.1 [28.8 kB] 947s Get:14 http://ftpmaster.internal/ubuntu noble/main amd64 libdhash1t64 amd64 0.6.2-2.1 [8580 B] 947s Get:15 http://ftpmaster.internal/ubuntu noble/main amd64 libpath-utils1t64 amd64 0.6.2-2.1 [8758 B] 947s Get:16 http://ftpmaster.internal/ubuntu noble/main amd64 libref-array1t64 amd64 0.6.2-2.1 [7406 B] 947s Get:17 http://ftpmaster.internal/ubuntu noble/main amd64 libini-config5t64 amd64 0.6.2-2.1 [43.5 kB] 947s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libipa-hbac0t64 amd64 2.9.4-1.1ubuntu2 [17.2 kB] 947s Get:19 http://ftpmaster.internal/ubuntu noble/main amd64 libtalloc2 amd64 2.4.2-1 [27.2 kB] 947s Get:20 http://ftpmaster.internal/ubuntu noble/main amd64 libtdb1 amd64 1.4.10-1 [46.7 kB] 947s Get:21 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libtevent0t64 amd64 0.16.1-2 [42.5 kB] 947s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libldb2 amd64 2:2.8.0+samba4.19.5+dfsg-4ubuntu2 [186 kB] 947s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnfsidmap1 amd64 1:2.6.4-3ubuntu3 [48.2 kB] 947s Get:24 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality-common all 1.4.5-3 [7658 B] 947s Get:25 http://ftpmaster.internal/ubuntu noble/main amd64 libpwquality1 amd64 1.4.5-3 [13.4 kB] 947s Get:26 http://ftpmaster.internal/ubuntu noble/main amd64 libpam-pwquality amd64 1.4.5-3 [11.7 kB] 947s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libwbclient0 amd64 2:4.19.5+dfsg-4ubuntu2 [70.3 kB] 947s Get:28 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 samba-libs amd64 2:4.19.5+dfsg-4ubuntu2 [6017 kB] 947s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsmbclient0 amd64 2:4.19.5+dfsg-4ubuntu2 [62.4 kB] 947s Get:30 http://ftpmaster.internal/ubuntu noble/universe amd64 softhsm2-common amd64 2.6.1-2.2 [5810 B] 947s Get:31 http://ftpmaster.internal/ubuntu noble/universe amd64 libsofthsm2 amd64 2.6.1-2.2 [268 kB] 947s Get:32 http://ftpmaster.internal/ubuntu noble/universe amd64 softhsm2 amd64 2.6.1-2.2 [176 kB] 947s Get:33 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 python3-sss amd64 2.9.4-1.1ubuntu2 [46.8 kB] 947s Get:34 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-idmap0 amd64 2.9.4-1.1ubuntu2 [21.5 kB] 947s Get:35 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libnss-sss amd64 2.9.4-1.1ubuntu2 [31.3 kB] 947s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libpam-sss amd64 2.9.4-1.1ubuntu2 [50.3 kB] 947s Get:37 http://ftpmaster.internal/ubuntu noble/main amd64 libc-ares2 amd64 1.27.0-1 [73.6 kB] 947s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-certmap0 amd64 2.9.4-1.1ubuntu2 [46.9 kB] 947s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 libsss-nss-idmap0 amd64 2.9.4-1.1ubuntu2 [30.1 kB] 947s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-common amd64 2.9.4-1.1ubuntu2 [1139 kB] 947s Get:41 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ad-common amd64 2.9.4-1.1ubuntu2 [77.1 kB] 947s Get:42 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-krb5-common amd64 2.9.4-1.1ubuntu2 [88.8 kB] 947s Get:43 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ad amd64 2.9.4-1.1ubuntu2 [135 kB] 947s Get:44 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ipa amd64 2.9.4-1.1ubuntu2 [221 kB] 947s Get:45 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-krb5 amd64 2.9.4-1.1ubuntu2 [14.5 kB] 947s Get:46 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-ldap amd64 2.9.4-1.1ubuntu2 [31.3 kB] 947s Get:47 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd-proxy amd64 2.9.4-1.1ubuntu2 [44.6 kB] 947s Get:48 http://ftpmaster.internal/ubuntu noble-proposed/main amd64 sssd amd64 2.9.4-1.1ubuntu2 [4118 B] 948s Fetched 11.3 MB in 0s (34.7 MB/s) 948s dpkg: libgnutls30:amd64: dependency problems, but removing anyway as you requested: 948s librtmp1:amd64 depends on libgnutls30 (>= 3.7.2). 948s libldap2:amd64 depends on libgnutls30 (>= 3.8.2). 948s libjcat1:amd64 depends on libgnutls30 (>= 3.7.3). 948s libcurl3-gnutls:amd64 depends on libgnutls30 (>= 3.8.2). 948s fwupd depends on libgnutls30 (>= 3.7.3). 948s dirmngr depends on libgnutls30 (>= 3.8.1). 948s apt depends on libgnutls30 (>= 3.8.1). 948s 948s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71824 files and directories currently installed.) 948s Removing libgnutls30:amd64 (3.8.3-1ubuntu2) ... 948s Selecting previously unselected package libgnutls30t64:amd64. 948s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71815 files and directories currently installed.) 948s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_amd64.deb ... 948s Unpacking libgnutls30t64:amd64 (3.8.3-1.1ubuntu2) ... 948s Setting up libgnutls30t64:amd64 (3.8.3-1.1ubuntu2) ... 948s dpkg: libtirpc3:amd64: dependency problems, but removing anyway as you requested: 948s lsof depends on libtirpc3 (>= 1.0.2). 948s libpython3.12-stdlib:amd64 depends on libtirpc3 (>= 1.0.2). 948s libpython3.11-stdlib:amd64 depends on libtirpc3 (>= 1.0.2). 948s libnsl2:amd64 depends on libtirpc3 (>= 1.0.2). 948s iproute2 depends on libtirpc3 (>= 1.0.2). 948s 948s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71843 files and directories currently installed.) 948s Removing libtirpc3:amd64 (1.3.4+ds-1build1) ... 948s Selecting previously unselected package libtirpc3t64:amd64. 948s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 71837 files and directories currently installed.) 948s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_amd64.deb ... 948s Adding 'diversion of /lib/x86_64-linux-gnu/libtirpc.so.3 to /lib/x86_64-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 948s Adding 'diversion of /lib/x86_64-linux-gnu/libtirpc.so.3.0.0 to /lib/x86_64-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 948s Unpacking libtirpc3t64:amd64 (1.3.4+ds-1.1) ... 948s Selecting previously unselected package libevent-2.1-7:amd64. 948s Preparing to unpack .../01-libevent-2.1-7_2.1.12-stable-9_amd64.deb ... 948s Unpacking libevent-2.1-7:amd64 (2.1.12-stable-9) ... 948s Selecting previously unselected package libunbound8:amd64. 948s Preparing to unpack .../02-libunbound8_1.19.1-1ubuntu1_amd64.deb ... 948s Unpacking libunbound8:amd64 (1.19.1-1ubuntu1) ... 948s Selecting previously unselected package libgnutls-dane0t64:amd64. 948s Preparing to unpack .../03-libgnutls-dane0t64_3.8.3-1.1ubuntu2_amd64.deb ... 948s Unpacking libgnutls-dane0t64:amd64 (3.8.3-1.1ubuntu2) ... 948s Selecting previously unselected package gnutls-bin. 948s Preparing to unpack .../04-gnutls-bin_3.8.3-1.1ubuntu2_amd64.deb ... 948s Unpacking gnutls-bin (3.8.3-1.1ubuntu2) ... 948s Selecting previously unselected package libavahi-common-data:amd64. 948s Preparing to unpack .../05-libavahi-common-data_0.8-13ubuntu2_amd64.deb ... 948s Unpacking libavahi-common-data:amd64 (0.8-13ubuntu2) ... 948s Selecting previously unselected package libavahi-common3:amd64. 948s Preparing to unpack .../06-libavahi-common3_0.8-13ubuntu2_amd64.deb ... 948s Unpacking libavahi-common3:amd64 (0.8-13ubuntu2) ... 948s Selecting previously unselected package libavahi-client3:amd64. 948s Preparing to unpack .../07-libavahi-client3_0.8-13ubuntu2_amd64.deb ... 948s Unpacking libavahi-client3:amd64 (0.8-13ubuntu2) ... 948s Selecting previously unselected package libbasicobjects0t64:amd64. 948s Preparing to unpack .../08-libbasicobjects0t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libbasicobjects0t64:amd64 (0.6.2-2.1) ... 948s Selecting previously unselected package libcollection4t64:amd64. 948s Preparing to unpack .../09-libcollection4t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libcollection4t64:amd64 (0.6.2-2.1) ... 948s Selecting previously unselected package libcrack2:amd64. 948s Preparing to unpack .../10-libcrack2_2.9.6-5.1_amd64.deb ... 948s Unpacking libcrack2:amd64 (2.9.6-5.1) ... 948s Selecting previously unselected package libdhash1t64:amd64. 948s Preparing to unpack .../11-libdhash1t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libdhash1t64:amd64 (0.6.2-2.1) ... 948s Selecting previously unselected package libpath-utils1t64:amd64. 948s Preparing to unpack .../12-libpath-utils1t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libpath-utils1t64:amd64 (0.6.2-2.1) ... 948s Selecting previously unselected package libref-array1t64:amd64. 948s Preparing to unpack .../13-libref-array1t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libref-array1t64:amd64 (0.6.2-2.1) ... 948s Selecting previously unselected package libini-config5t64:amd64. 948s Preparing to unpack .../14-libini-config5t64_0.6.2-2.1_amd64.deb ... 948s Unpacking libini-config5t64:amd64 (0.6.2-2.1) ... 949s Selecting previously unselected package libipa-hbac0t64. 949s Preparing to unpack .../15-libipa-hbac0t64_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libtalloc2:amd64. 949s Preparing to unpack .../16-libtalloc2_2.4.2-1_amd64.deb ... 949s Unpacking libtalloc2:amd64 (2.4.2-1) ... 949s Selecting previously unselected package libtdb1:amd64. 949s Preparing to unpack .../17-libtdb1_1.4.10-1_amd64.deb ... 949s Unpacking libtdb1:amd64 (1.4.10-1) ... 949s Selecting previously unselected package libtevent0t64:amd64. 949s Preparing to unpack .../18-libtevent0t64_0.16.1-2_amd64.deb ... 949s Unpacking libtevent0t64:amd64 (0.16.1-2) ... 949s Selecting previously unselected package libldb2:amd64. 949s Preparing to unpack .../19-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu2_amd64.deb ... 949s Unpacking libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 949s Selecting previously unselected package libnfsidmap1:amd64. 949s Preparing to unpack .../20-libnfsidmap1_1%3a2.6.4-3ubuntu3_amd64.deb ... 949s Unpacking libnfsidmap1:amd64 (1:2.6.4-3ubuntu3) ... 949s Selecting previously unselected package libpwquality-common. 949s Preparing to unpack .../21-libpwquality-common_1.4.5-3_all.deb ... 949s Unpacking libpwquality-common (1.4.5-3) ... 949s Selecting previously unselected package libpwquality1:amd64. 949s Preparing to unpack .../22-libpwquality1_1.4.5-3_amd64.deb ... 949s Unpacking libpwquality1:amd64 (1.4.5-3) ... 949s Selecting previously unselected package libpam-pwquality:amd64. 949s Preparing to unpack .../23-libpam-pwquality_1.4.5-3_amd64.deb ... 949s Unpacking libpam-pwquality:amd64 (1.4.5-3) ... 949s Selecting previously unselected package libwbclient0:amd64. 949s Preparing to unpack .../24-libwbclient0_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 949s Unpacking libwbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 949s Selecting previously unselected package samba-libs:amd64. 949s Preparing to unpack .../25-samba-libs_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 949s Unpacking samba-libs:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 949s Selecting previously unselected package libsmbclient0:amd64. 949s Preparing to unpack .../26-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu2_amd64.deb ... 949s Unpacking libsmbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 949s Selecting previously unselected package softhsm2-common. 949s Preparing to unpack .../27-softhsm2-common_2.6.1-2.2_amd64.deb ... 949s Unpacking softhsm2-common (2.6.1-2.2) ... 949s Selecting previously unselected package libsofthsm2. 949s Preparing to unpack .../28-libsofthsm2_2.6.1-2.2_amd64.deb ... 949s Unpacking libsofthsm2 (2.6.1-2.2) ... 949s Selecting previously unselected package softhsm2. 949s Preparing to unpack .../29-softhsm2_2.6.1-2.2_amd64.deb ... 949s Unpacking softhsm2 (2.6.1-2.2) ... 949s Selecting previously unselected package python3-sss. 949s Preparing to unpack .../30-python3-sss_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking python3-sss (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libsss-idmap0. 949s Preparing to unpack .../31-libsss-idmap0_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libnss-sss:amd64. 949s Preparing to unpack .../32-libnss-sss_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libnss-sss:amd64 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libpam-sss:amd64. 949s Preparing to unpack .../33-libpam-sss_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libpam-sss:amd64 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libc-ares2:amd64. 949s Preparing to unpack .../34-libc-ares2_1.27.0-1_amd64.deb ... 949s Unpacking libc-ares2:amd64 (1.27.0-1) ... 949s Selecting previously unselected package libsss-certmap0. 949s Preparing to unpack .../35-libsss-certmap0_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package libsss-nss-idmap0. 949s Preparing to unpack .../36-libsss-nss-idmap0_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-common. 949s Preparing to unpack .../37-sssd-common_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-common (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-ad-common. 949s Preparing to unpack .../38-sssd-ad-common_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-ad-common (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-krb5-common. 949s Preparing to unpack .../39-sssd-krb5-common_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-ad. 949s Preparing to unpack .../40-sssd-ad_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-ad (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-ipa. 949s Preparing to unpack .../41-sssd-ipa_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-ipa (2.9.4-1.1ubuntu2) ... 949s Selecting previously unselected package sssd-krb5. 949s Preparing to unpack .../42-sssd-krb5_2.9.4-1.1ubuntu2_amd64.deb ... 949s Unpacking sssd-krb5 (2.9.4-1.1ubuntu2) ... 950s Selecting previously unselected package sssd-ldap. 950s Preparing to unpack .../43-sssd-ldap_2.9.4-1.1ubuntu2_amd64.deb ... 950s Unpacking sssd-ldap (2.9.4-1.1ubuntu2) ... 950s Selecting previously unselected package sssd-proxy. 950s Preparing to unpack .../44-sssd-proxy_2.9.4-1.1ubuntu2_amd64.deb ... 950s Unpacking sssd-proxy (2.9.4-1.1ubuntu2) ... 950s Selecting previously unselected package sssd. 950s Preparing to unpack .../45-sssd_2.9.4-1.1ubuntu2_amd64.deb ... 950s Unpacking sssd (2.9.4-1.1ubuntu2) ... 950s Selecting previously unselected package autopkgtest-satdep. 950s Preparing to unpack .../46-3-autopkgtest-satdep.deb ... 950s Unpacking autopkgtest-satdep (0) ... 950s Setting up libpwquality-common (1.4.5-3) ... 950s Setting up softhsm2-common (2.6.1-2.2) ... 950s 950s Creating config file /etc/softhsm/softhsm2.conf with new version 950s Setting up libnfsidmap1:amd64 (1:2.6.4-3ubuntu3) ... 950s Setting up libsss-idmap0 (2.9.4-1.1ubuntu2) ... 950s Setting up libbasicobjects0t64:amd64 (0.6.2-2.1) ... 950s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu2) ... 950s Setting up libtirpc3t64:amd64 (1.3.4+ds-1.1) ... 950s Setting up libref-array1t64:amd64 (0.6.2-2.1) ... 950s Setting up libtdb1:amd64 (1.4.10-1) ... 950s Setting up libcollection4t64:amd64 (0.6.2-2.1) ... 950s Setting up libc-ares2:amd64 (1.27.0-1) ... 950s Setting up libwbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 950s Setting up libtalloc2:amd64 (2.4.2-1) ... 950s Setting up libpath-utils1t64:amd64 (0.6.2-2.1) ... 950s Setting up libavahi-common-data:amd64 (0.8-13ubuntu2) ... 950s Setting up libdhash1t64:amd64 (0.6.2-2.1) ... 950s Setting up libevent-2.1-7:amd64 (2.1.12-stable-9) ... 950s Setting up libcrack2:amd64 (2.9.6-5.1) ... 950s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu2) ... 950s Setting up libini-config5t64:amd64 (0.6.2-2.1) ... 950s Setting up libtevent0t64:amd64 (0.16.1-2) ... 950s Setting up libnss-sss:amd64 (2.9.4-1.1ubuntu2) ... 950s Setting up libsofthsm2 (2.6.1-2.2) ... 950s Setting up softhsm2 (2.6.1-2.2) ... 950s Setting up libavahi-common3:amd64 (0.8-13ubuntu2) ... 950s Setting up libsss-certmap0 (2.9.4-1.1ubuntu2) ... 950s Setting up libunbound8:amd64 (1.19.1-1ubuntu1) ... 950s Setting up libpwquality1:amd64 (1.4.5-3) ... 950s Setting up libgnutls-dane0t64:amd64 (3.8.3-1.1ubuntu2) ... 950s Setting up libldb2:amd64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 950s Setting up libavahi-client3:amd64 (0.8-13ubuntu2) ... 950s Setting up gnutls-bin (3.8.3-1.1ubuntu2) ... 950s Setting up libpam-pwquality:amd64 (1.4.5-3) ... 950s Setting up samba-libs:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 950s Setting up python3-sss (2.9.4-1.1ubuntu2) ... 950s Setting up libsmbclient0:amd64 (2:4.19.5+dfsg-4ubuntu2) ... 950s Setting up libpam-sss:amd64 (2.9.4-1.1ubuntu2) ... 950s Setting up sssd-common (2.9.4-1.1ubuntu2) ... 950s Creating SSSD system user & group... 951s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 951s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 951s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 951s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 951s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 952s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 952s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 952s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 952s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 953s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 953s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 953s sssd-autofs.service is a disabled or a static unit, not starting it. 953s sssd-nss.service is a disabled or a static unit, not starting it. 953s sssd-pam.service is a disabled or a static unit, not starting it. 953s sssd-ssh.service is a disabled or a static unit, not starting it. 954s sssd-sudo.service is a disabled or a static unit, not starting it. 954s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 954s Setting up sssd-proxy (2.9.4-1.1ubuntu2) ... 954s Setting up sssd-ad-common (2.9.4-1.1ubuntu2) ... 954s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 954s sssd-pac.service is a disabled or a static unit, not starting it. 954s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 954s Setting up sssd-krb5-common (2.9.4-1.1ubuntu2) ... 954s Setting up sssd-krb5 (2.9.4-1.1ubuntu2) ... 954s Setting up sssd-ldap (2.9.4-1.1ubuntu2) ... 954s Setting up sssd-ad (2.9.4-1.1ubuntu2) ... 954s Setting up sssd-ipa (2.9.4-1.1ubuntu2) ... 954s Setting up sssd (2.9.4-1.1ubuntu2) ... 954s Setting up autopkgtest-satdep (0) ... 954s Processing triggers for man-db (2.12.0-3) ... 956s Processing triggers for libc-bin (2.39-0ubuntu2) ... 959s (Reading database ... 72444 files and directories currently installed.) 959s Removing autopkgtest-satdep (0) ... 962s autopkgtest [18:43:21]: test sssd-softhism2-certificates-tests.sh: [----------------------- 963s + '[' -z ubuntu ']' 963s + required_tools=(p11tool openssl softhsm2-util) 963s + for cmd in "${required_tools[@]}" 963s + command -v p11tool 963s + for cmd in "${required_tools[@]}" 963s + command -v openssl 963s + for cmd in "${required_tools[@]}" 963s + command -v softhsm2-util 963s + PIN=053350 963s +++ find /usr/lib/softhsm/libsofthsm2.so 963s +++ head -n 1 963s ++ realpath /usr/lib/softhsm/libsofthsm2.so 963s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 963s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 963s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 963s + '[' '!' -v NO_SSSD_TESTS ']' 963s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 963s + ca_db_arg=ca_db 963s ++ /usr/libexec/sssd/p11_child --help 963s + p11_child_help='Usage: p11_child [OPTION...] 963s -d, --debug-level=INT Debug level 963s --debug-timestamps=INT Add debug timestamps 963s --debug-microseconds=INT Show timestamps with microseconds 963s --dumpable=INT Allow core dumps 963s --debug-fd=INT An open file descriptor for the debug 963s logs 963s --logger=stderr|files|journald Set logger 963s --auth Run in auth mode 963s --pre Run in pre-auth mode 963s --wait_for_card Wait until card is available 963s --verification Run in verification mode 963s --pin Expect PIN on stdin 963s --keypad Expect PIN on keypad 963s --verify=STRING Tune validation 963s --ca_db=STRING CA DB to use 963s --module_name=STRING Module name for authentication 963s --token_name=STRING Token name for authentication 963s --key_id=STRING Key ID for authentication 963s --label=STRING Label for authentication 963s --certificate=STRING certificate to verify, base64 encoded 963s --uri=STRING PKCS#11 URI to restrict selection 963s --chain-id=LONG Tevent chain ID used for logging 963s purposes 963s 963s Help options: 963s -?, --help Show this help message 963s --usage Display brief usage message' 963s + echo 'Usage: p11_child [OPTION...] 963s -d, --debug-level=INT Debug level 963s --debug-timestamps=INT Add debug timestamps 963s --debug-microseconds=INT Show timestamps with microseconds 963s --dumpable=INT Allow core dumps 963s --debug-fd=INT An open file descriptor for the debug 963s logs 963s --logger=stderr|files|journald Set logger 963s --auth Run in auth mode 963s --pre Run in pre-auth mode 963s --wait_for_card Wait until card is available 963s --verification Run in verification mode 963s --pin Expect PIN on stdin 963s --keypad Expect PIN on keypad 963s --verify=STRING Tune validation 963s --ca_db=STRING CA DB to use 963s --module_name=STRING Module name for authentication 963s --token_name=STRING Token name for authentication 963s --key_id=STRING Key ID for authentication 963s --label=STRING Label for authentication 963s --certificate=STRING certificate to verify, base64 encoded 963s --uri=STRING PKCS#11 URI to restrict selection 963s --chain-id=LONG Tevent chain ID used for logging 963s purposes 963s 963s Help options: 963s -?, --help Show this help message 963s --usage Display brief usage message' 963s + grep nssdb -qs 963s + echo 'Usage: p11_child [OPTION...] 963s -d, --debug-level=INT Debug level 963s --debug-timestamps=INT Add debug timestamps 963s --debug-microseconds=INT Show timestamps with microseconds 963s --dumpable=INT Allow core dumps 963s --debug-fd=INT An open file descriptor for the debug 963s logs 963s --logger=stderr|files|journald Set logger 963s --auth Run in auth mode 963s --pre Run in pre-auth mode 963s --wait_for_card Wait until card is available 963s --verification Run in verification mode 963s --pin Expect PIN on stdin 963s --keypad Expect PIN on keypad 963s --verify=STRING Tune validation 963s --ca_db=STRING CA DB to use 963s --module_name=STRING Module name for authentication 963s --token_name=STRING Token name for authentication 963s --key_id=STRING Key ID for authentication 963s --label=STRING Label for authentication 963s --certificate=STRING certificate to verify, base64 encoded 963s --uri=STRING PKCS#11 URI to restrict selection 963s --chain-id=LONG Tevent chain ID used for logging 963s purposes 963s 963s Help options: 963s -?, --help Show this help message 963s --usage Display brief usage message' 963s + grep -qs -- --ca_db 963s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 963s ++ mktemp -d -t sssd-softhsm2-XXXXXX 963s + tmpdir=/tmp/sssd-softhsm2-rYVL6z 963s + keys_size=1024 963s + [[ ! -v KEEP_TEMPORARY_FILES ]] 963s + trap 'rm -rf "$tmpdir"' EXIT 963s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 963s + echo -n 01 963s + touch /tmp/sssd-softhsm2-rYVL6z/index.txt 963s + mkdir -p /tmp/sssd-softhsm2-rYVL6z/new_certs 963s + cat 963s + root_ca_key_pass=pass:random-root-CA-password-7216 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA-key.pem -passout pass:random-root-CA-password-7216 1024 963s + openssl req -passin pass:random-root-CA-password-7216 -batch -config /tmp/sssd-softhsm2-rYVL6z/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-rYVL6z/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 963s + cat 963s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-15311 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-15311 1024 963s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-15311 -config /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.config -key /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-7216 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-certificate-request.pem 963s + openssl req -text -noout -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-certificate-request.pem 963s Certificate Request: 963s Data: 963s Version: 1 (0x0) 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:d3:a9:a4:9c:58:88:bf:de:9a:72:fc:77:76:b0: 963s e2:12:db:a3:6e:e8:44:9c:37:0a:f2:d3:c8:2a:a6: 963s 22:8c:fc:cf:e6:88:ac:5b:82:bf:b3:84:bc:48:f2: 963s 64:9c:85:7c:ed:08:45:2a:d1:04:5a:56:43:e0:86: 963s b0:4f:ab:62:8e:14:c9:8e:30:09:1b:c1:ce:94:79: 963s 9d:f3:59:5c:6d:cc:00:a4:bc:0b:48:d6:17:a6:ae: 963s b7:e1:a4:da:c9:4b:96:0d:b9:55:8d:76:f5:7e:89: 963s 56:18:20:76:d3:cf:e1:ad:31:02:a0:e6:ed:74:25: 963s bc:b5:95:90:2f:bb:99:cd:0f 963s Exponent: 65537 (0x10001) 963s Attributes: 963s (none) 963s Requested Extensions: 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 27:f5:08:dd:e1:7d:f3:bc:00:8b:1a:27:3f:28:69:0e:96:02: 963s 7e:b4:1f:41:37:a8:ac:35:eb:62:df:c8:89:ae:55:b7:cf:7b: 963s 57:5d:20:53:86:2d:3d:64:24:32:de:d1:2f:10:0c:be:3d:c2: 963s d0:3a:ae:1b:3a:23:4c:f3:b2:22:8e:e0:10:e7:ac:da:1a:6f: 963s 69:8a:2f:5d:d3:f2:b7:dc:bc:a2:8e:1e:4c:28:44:74:6d:ec: 963s 12:a1:7b:88:e7:b6:bb:b7:7b:f5:ff:40:b8:27:28:26:39:27: 963s a3:79:5e:af:84:04:d7:ee:88:8e:06:3d:18:d2:a9:44:e8:8c: 963s 6f:4b 963s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rYVL6z/test-root-CA.config -passin pass:random-root-CA-password-7216 -keyfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA-key.pem -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 963s Using configuration from /tmp/sssd-softhsm2-rYVL6z/test-root-CA.config 963s Check that the request matches the signature 963s Signature ok 963s Certificate Details: 963s Serial Number: 1 (0x1) 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: 963s organizationName = Test Organization 963s organizationalUnitName = Test Organization Unit 963s commonName = Test Organization Intermediate CA 963s X509v3 extensions: 963s X509v3 Subject Key Identifier: 963s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 963s X509v3 Authority Key Identifier: 963s keyid:83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 963s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 963s serial:00 963s X509v3 Basic Constraints: 963s CA:TRUE 963s X509v3 Key Usage: critical 963s Digital Signature, Certificate Sign, CRL Sign 963s Certificate is to be certified until Mar 13 18:43:22 2025 GMT (365 days) 963s 963s Write out database with 1 new entries 963s Database updated 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem: OK 963s + cat 963s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-28176 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-28176 1024 963s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-28176 -config /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-15311 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-certificate-request.pem 963s + openssl req -text -noout -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-certificate-request.pem 963s Certificate Request: 963s Data: 963s Version: 1 (0x0) 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:b3:0f:b6:43:b9:42:a6:67:d5:d0:a3:71:be:14: 963s b4:15:b8:24:58:21:43:9b:59:ff:02:d5:b6:c8:b6: 963s 77:a5:8d:12:96:2e:b9:94:6d:4e:2b:d7:f9:03:54: 963s 87:0d:05:f6:52:62:18:1f:f3:41:01:76:76:4e:1f: 963s b2:2d:2c:0d:5e:d8:78:2c:d1:ab:fb:b5:dd:ef:71: 963s b6:a1:d5:c3:6a:cb:0b:4f:30:af:9b:4a:2f:74:ee: 963s 44:e3:e5:ff:f5:ca:ce:50:7c:e8:4e:5a:a8:65:12: 963s 50:38:5d:17:b4:0f:a0:64:6d:13:14:97:a8:73:a1: 963s e3:e0:da:21:15:cd:38:ba:03 963s Exponent: 65537 (0x10001) 963s Attributes: 963s (none) 963s Requested Extensions: 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 47:41:d7:4d:cd:f2:75:2c:38:03:e1:17:5f:b8:ea:67:5a:1a: 963s 38:2d:04:a0:97:41:54:9f:36:89:91:17:b3:29:e4:92:e9:88: 963s e0:35:69:b9:5f:4e:d1:70:75:12:dd:7f:b0:67:28:42:de:f3: 963s db:02:eb:ac:c1:32:5c:eb:d6:2d:02:e5:c4:ae:bd:05:3a:06: 963s 4c:eb:3b:89:17:02:30:0c:3f:e8:9f:74:d5:7f:26:98:6e:9d: 963s 45:3d:65:62:5e:43:ba:62:8f:6a:da:9a:06:54:bf:f0:cf:04: 963s 4f:fa:fd:7d:aa:dd:bd:0e:4c:0f:17:8e:6c:62:28:22:94:4e: 963s 7e:20 963s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-15311 -keyfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s Using configuration from /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.config 963s Check that the request matches the signature 963s Signature ok 963s Certificate Details: 963s Serial Number: 2 (0x2) 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: 963s organizationName = Test Organization 963s organizationalUnitName = Test Organization Unit 963s commonName = Test Organization Sub Intermediate CA 963s X509v3 extensions: 963s X509v3 Subject Key Identifier: 963s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 963s X509v3 Authority Key Identifier: 963s keyid:EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 963s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 963s serial:01 963s X509v3 Basic Constraints: 963s CA:TRUE 963s X509v3 Key Usage: critical 963s Digital Signature, Certificate Sign, CRL Sign 963s Certificate is to be certified until Mar 13 18:43:22 2025 GMT (365 days) 963s 963s Write out database with 1 new entries 963s Database updated 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem: OK 963s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 963s error 20 at 0 depth lookup: unable to get local issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem: verification failed 963s + cat 963s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-8294 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-8294 1024 963s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-8294 -key /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-request.pem 963s + openssl req -text -noout -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-request.pem 963s Certificate Request: 963s Data: 963s Version: 1 (0x0) 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 963s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 963s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 963s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 963s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 963s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 963s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 963s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 963s 04:bc:31:02:20:d7:df:0f:65 963s Exponent: 65537 (0x10001) 963s Attributes: 963s Requested Extensions: 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Root CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 4a:95:4d:57:da:56:f3:92:04:8c:fc:82:55:3b:f1:6b:27:24: 963s 5b:fc:53:d2:2c:02:db:39:78:0c:ef:b1:c6:21:9f:80:bc:db: 963s b2:04:24:37:f2:44:80:31:66:5a:ad:2f:89:7b:4d:01:7f:51: 963s eb:06:85:fd:ea:08:b2:56:39:25:81:86:6c:14:3e:19:8c:bb: 963s 2a:bf:54:8a:29:9b:47:e7:96:87:1d:e8:a5:54:b9:56:42:84: 963s 34:2d:e6:3e:e6:81:ef:88:05:f2:f3:cc:2c:5a:59:be:71:1c: 963s ca:d9:95:31:f5:e1:59:c9:1b:fb:d1:d7:93:e9:63:3f:cb:dc: 963s df:e9 963s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rYVL6z/test-root-CA.config -passin pass:random-root-CA-password-7216 -keyfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA-key.pem -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s Using configuration from /tmp/sssd-softhsm2-rYVL6z/test-root-CA.config 963s Check that the request matches the signature 963s Signature ok 963s Certificate Details: 963s Serial Number: 3 (0x3) 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: 963s organizationName = Test Organization 963s organizationalUnitName = Test Organization Unit 963s commonName = Test Organization Root Trusted Certificate 0001 963s X509v3 extensions: 963s X509v3 Authority Key Identifier: 963s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Root CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Certificate is to be certified until Mar 13 18:43:22 2025 GMT (365 days) 963s 963s Write out database with 1 new entries 963s Database updated 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem: OK 963s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 963s error 20 at 0 depth lookup: unable to get local issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem: verification failed 963s + cat 963s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-2928 1024 963s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-2928 -key /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-request.pem 963s + openssl req -text -noout -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-request.pem 963s Certificate Request: 963s Data: 963s Version: 1 (0x0) 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 963s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 963s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 963s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 963s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 963s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 963s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 963s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 963s 60:b8:22:02:54:30:2a:44:e1 963s Exponent: 65537 (0x10001) 963s Attributes: 963s Requested Extensions: 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Intermediate CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 20:64:d6:63:02:0e:f0:78:14:42:3b:67:bc:15:5e:80:77:4d: 963s 6e:c0:65:0c:61:a8:0a:a9:e4:6a:b2:74:e7:f2:5d:a5:f6:83: 963s d3:5e:43:d1:f0:70:d9:56:be:40:88:d5:e5:40:9b:6a:05:7d: 963s 04:6a:fd:77:8b:4b:cf:91:81:42:58:7e:f0:93:22:d2:01:b6: 963s 30:56:1a:d9:7d:2f:7c:c4:3a:ca:30:94:36:a2:dd:8a:7c:45: 963s f9:e9:8c:d6:a7:aa:7c:d5:79:bc:6c:6b:dc:40:b1:f9:71:8b: 963s 27:8f:15:f8:ae:99:2b:83:9c:54:fe:9c:04:dd:1f:5a:15:de: 963s 7f:4f 963s + openssl ca -passin pass:random-intermediate-CA-password-15311 -config /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s Using configuration from /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.config 963s Check that the request matches the signature 963s Signature ok 963s Certificate Details: 963s Serial Number: 4 (0x4) 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: 963s organizationName = Test Organization 963s organizationalUnitName = Test Organization Unit 963s commonName = Test Organization Intermediate Trusted Certificate 0001 963s X509v3 extensions: 963s X509v3 Authority Key Identifier: 963s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Intermediate CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Certificate is to be certified until Mar 13 18:43:22 2025 GMT (365 days) 963s 963s Write out database with 1 new entries 963s Database updated 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s + echo 'This certificate should not be trusted fully' 963s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 963s error 2 at 1 depth lookup: unable to get issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 963s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s This certificate should not be trusted fully 963s /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem: OK 963s + cat 963s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 963s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-10794 1024 963s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10794 -key /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 963s + openssl req -text -noout -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 963s Certificate Request: 963s Data: 963s Version: 1 (0x0) 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 963s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 963s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 963s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 963s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 963s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 963s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 963s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 963s 75:3d:06:43:04:fc:51:dd:41 963s Exponent: 65537 (0x10001) 963s Attributes: 963s Requested Extensions: 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Sub Intermediate CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 6e:52:2a:47:36:e8:b5:51:d9:f8:cd:17:92:93:47:25:a9:51: 963s e7:7d:5d:fc:aa:6e:0e:e8:b2:7d:60:a9:8b:8e:67:1e:3a:8e: 963s ee:4a:c5:ab:ab:b4:de:1e:e7:16:15:2e:4e:ed:6b:d7:c8:be: 963s 93:a5:14:5a:62:6f:ce:bd:38:7f:39:92:a7:c6:75:81:bb:d2: 963s 7e:e0:90:9d:bc:d8:22:ac:a8:09:55:8d:e4:c5:ad:69:6e:f3: 963s 6d:e1:72:ca:90:bb:49:3b:04:ef:88:26:dd:b7:94:a3:55:c6: 963s ec:50:61:02:bb:f4:4b:e6:a4:17:0d:dd:cf:20:2f:54:df:95: 963s a3:ac 963s + openssl ca -passin pass:random-sub-intermediate-CA-password-28176 -config /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s Using configuration from /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.config 963s Check that the request matches the signature 963s Signature ok 963s Certificate Details: 963s Serial Number: 5 (0x5) 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: 963s organizationName = Test Organization 963s organizationalUnitName = Test Organization Unit 963s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 963s X509v3 extensions: 963s X509v3 Authority Key Identifier: 963s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Sub Intermediate CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Certificate is to be certified until Mar 13 18:43:22 2025 GMT (365 days) 963s 963s Write out database with 1 new entries 963s Database updated 963s + openssl x509 -noout -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s + echo 'This certificate should not be trusted fully' 963s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s This certificate should not be trusted fully 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 963s error 2 at 1 depth lookup: unable to get issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 963s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 963s error 20 at 0 depth lookup: unable to get local issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 963s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 963s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s + local cmd=openssl 963s + shift 963s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 963s error 20 at 0 depth lookup: unable to get local issuer certificate 963s error /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 963s + echo 'Building a the full-chain CA file...' 963s Building a the full-chain CA file... 963s + cat /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s + cat /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 963s + cat /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 963s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 963s + openssl pkcs7 -print_certs -noout 963s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 963s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 963s 963s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 963s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 963s 963s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 963s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 963s 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem: OK 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem: OK 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem: OK 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem: OK 963s + openssl verify -CAfile /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 963s /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 963s + echo 'Certificates generation completed!' 963s + [[ -v NO_SSSD_TESTS ]] 963s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /dev/null 963s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /dev/null 963s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 963s + local key_ring=/dev/null 963s + local verify_option= 963s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 963s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 963s + local key_cn 963s + local key_name 963s + local tokens_dir 963s + local output_cert_file 963s + token_name= 963s Certificates generation completed! 963s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 963s + key_name=test-root-CA-trusted-certificate-0001 963s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s ++ sed -n 's/ *commonName *= //p' 963s + key_cn='Test Organization Root Trusted Certificate 0001' 963s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 963s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 963s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 963s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 963s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 963s + token_name='Test Organization Root Tr Token' 963s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 963s + local key_file 963s + local decrypted_key 963s + mkdir -p /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 963s + key_file=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key.pem 963s + decrypted_key=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key-decrypted.pem 963s + cat 963s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 963s Slot 0 has a free/uninitialized token. 963s The token has been initialized and is reassigned to slot 1992237348 963s + softhsm2-util --show-slots 963s Available slots: 963s Slot 1992237348 963s Slot info: 963s Description: SoftHSM slot ID 0x76bf2124 963s Manufacturer ID: SoftHSM project 963s Hardware version: 2.6 963s Firmware version: 2.6 963s Token present: yes 963s Token info: 963s Manufacturer ID: SoftHSM project 963s Model: SoftHSM v2 963s Hardware version: 2.6 963s Firmware version: 2.6 963s Serial number: 4c861b0876bf2124 963s Initialized: yes 963s User PIN init.: yes 963s Label: Test Organization Root Tr Token 963s Slot 1 963s Slot info: 963s Description: SoftHSM slot ID 0x1 963s Manufacturer ID: SoftHSM project 963s Hardware version: 2.6 963s Firmware version: 2.6 963s Token present: yes 963s Token info: 963s Manufacturer ID: SoftHSM project 963s Model: SoftHSM v2 963s Hardware version: 2.6 963s Firmware version: 2.6 963s Serial number: 963s Initialized: no 963s User PIN init.: no 963s Label: 963s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 963s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-8294 -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key-decrypted.pem 963s writing RSA key 963s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 963s + rm /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001-key-decrypted.pem 963s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 963s Object 0: 963s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 963s Type: X.509 Certificate (RSA-1024) 963s Expires: Thu Mar 13 18:43:22 2025 963s Label: Test Organization Root Trusted Certificate 0001 963s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 963s 963s + echo 'Test Organization Root Tr Token' 963s + '[' -n '' ']' 963s + local output_base_name=SSSD-child-9183 963s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9183.output 963s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9183.pem 963s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 963s [p11_child[2230]] [main] (0x0400): p11_child started. 963s [p11_child[2230]] [main] (0x2000): Running in [pre-auth] mode. 963s [p11_child[2230]] [main] (0x2000): Running with effective IDs: [0][0]. 963s [p11_child[2230]] [main] (0x2000): Running with real IDs [0][0]. 963s Test Organization Root Tr Token 963s [p11_child[2230]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 963s [p11_child[2230]] [do_work] (0x0040): init_verification failed. 963s [p11_child[2230]] [main] (0x0020): p11_child failed (5) 963s + return 2 963s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /dev/null no_verification 963s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /dev/null no_verification 963s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 963s + local key_ring=/dev/null 963s + local verify_option=no_verification 963s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 963s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 963s + local key_cn 963s + local key_name 963s + local tokens_dir 963s + local output_cert_file 963s + token_name= 963s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 963s + key_name=test-root-CA-trusted-certificate-0001 963s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s ++ sed -n 's/ *commonName *= //p' 963s + key_cn='Test Organization Root Trusted Certificate 0001' 963s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 963s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 963s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 963s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 963s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 963s + token_name='Test Organization Root Tr Token' 963s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 963s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 963s + echo 'Test Organization Root Tr Token' 963s + '[' -n no_verification ']' 963s + local verify_arg=--verify=no_verification 963s + local output_base_name=SSSD-child-21817 963s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.output 963s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.pem 963s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 963s Test Organization Root Tr Token 963s [p11_child[2236]] [main] (0x0400): p11_child started. 963s [p11_child[2236]] [main] (0x2000): Running in [pre-auth] mode. 963s [p11_child[2236]] [main] (0x2000): Running with effective IDs: [0][0]. 963s [p11_child[2236]] [main] (0x2000): Running with real IDs [0][0]. 963s [p11_child[2236]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 963s [p11_child[2236]] [do_card] (0x4000): Module List: 963s [p11_child[2236]] [do_card] (0x4000): common name: [softhsm2]. 963s [p11_child[2236]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 963s [p11_child[2236]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 963s [p11_child[2236]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 963s [p11_child[2236]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 963s [p11_child[2236]] [do_card] (0x4000): Login NOT required. 963s [p11_child[2236]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 963s [p11_child[2236]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 963s [p11_child[2236]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 963s [p11_child[2236]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 963s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.output 963s + echo '-----BEGIN CERTIFICATE-----' 963s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.output 963s + echo '-----END CERTIFICATE-----' 963s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.pem 963s Certificate: 963s Data: 963s Version: 3 (0x2) 963s Serial Number: 3 (0x3) 963s Signature Algorithm: sha256WithRSAEncryption 963s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 963s Validity 963s Not Before: Mar 13 18:43:22 2024 GMT 963s Not After : Mar 13 18:43:22 2025 GMT 963s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 963s Subject Public Key Info: 963s Public Key Algorithm: rsaEncryption 963s Public-Key: (1024 bit) 963s Modulus: 963s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 963s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 963s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 963s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 963s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 963s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 963s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 963s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 963s 04:bc:31:02:20:d7:df:0f:65 963s Exponent: 65537 (0x10001) 963s X509v3 extensions: 963s X509v3 Authority Key Identifier: 963s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 963s X509v3 Basic Constraints: 963s CA:FALSE 963s Netscape Cert Type: 963s SSL Client, S/MIME 963s Netscape Comment: 963s Test Organization Root CA trusted Certificate 963s X509v3 Subject Key Identifier: 963s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 963s X509v3 Key Usage: critical 963s Digital Signature, Non Repudiation, Key Encipherment 963s X509v3 Extended Key Usage: 963s TLS Web Client Authentication, E-mail Protection 963s X509v3 Subject Alternative Name: 963s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 963s Signature Algorithm: sha256WithRSAEncryption 963s Signature Value: 963s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 963s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 963s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 963s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 963s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 963s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 963s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 963s 2f:6b 963s + local found_md5 expected_md5 963s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 963s + expected_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 963s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817.pem 963s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 963s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 963s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.output 963s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.output .output 963s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.pem 963s + echo -n 053350 963s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 963s [p11_child[2244]] [main] (0x0400): p11_child started. 963s [p11_child[2244]] [main] (0x2000): Running in [auth] mode. 963s [p11_child[2244]] [main] (0x2000): Running with effective IDs: [0][0]. 963s [p11_child[2244]] [main] (0x2000): Running with real IDs [0][0]. 963s [p11_child[2244]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 963s [p11_child[2244]] [do_card] (0x4000): Module List: 963s [p11_child[2244]] [do_card] (0x4000): common name: [softhsm2]. 963s [p11_child[2244]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 963s [p11_child[2244]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 963s [p11_child[2244]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 963s [p11_child[2244]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 963s [p11_child[2244]] [do_card] (0x4000): Login required. 963s [p11_child[2244]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 963s [p11_child[2244]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 963s [p11_child[2244]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 963s [p11_child[2244]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 963s [p11_child[2244]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 963s [p11_child[2244]] [do_card] (0x4000): Certificate verified and validated. 963s [p11_child[2244]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 963s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.output 963s + echo '-----BEGIN CERTIFICATE-----' 963s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.output 963s + echo '-----END CERTIFICATE-----' 963s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21817-auth.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s + local verify_option= 964s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_cn 964s + local key_name 964s + local tokens_dir 964s + local output_cert_file 964s + token_name= 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 964s + key_name=test-root-CA-trusted-certificate-0001 964s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s ++ sed -n 's/ *commonName *= //p' 964s + key_cn='Test Organization Root Trusted Certificate 0001' 964s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 964s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 964s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 964s + token_name='Test Organization Root Tr Token' 964s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 964s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 964s + echo 'Test Organization Root Tr Token' 964s + '[' -n '' ']' 964s + local output_base_name=SSSD-child-11312 964s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.pem 964s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s Test Organization Root Tr Token 964s [p11_child[2254]] [main] (0x0400): p11_child started. 964s [p11_child[2254]] [main] (0x2000): Running in [pre-auth] mode. 964s [p11_child[2254]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2254]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2254]] [do_card] (0x4000): Module List: 964s [p11_child[2254]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2254]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2254]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2254]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2254]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2254]] [do_card] (0x4000): Login NOT required. 964s [p11_child[2254]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2254]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2254]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2254]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2254]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.pem 964s + local found_md5 expected_md5 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s + expected_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.output 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.output .output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.pem 964s + echo -n 053350 964s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 964s [p11_child[2262]] [main] (0x0400): p11_child started. 964s [p11_child[2262]] [main] (0x2000): Running in [auth] mode. 964s [p11_child[2262]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2262]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2262]] [do_card] (0x4000): Module List: 964s [p11_child[2262]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2262]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2262]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2262]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2262]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2262]] [do_card] (0x4000): Login required. 964s [p11_child[2262]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2262]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2262]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2262]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 964s [p11_child[2262]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 964s [p11_child[2262]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 964s [p11_child[2262]] [do_card] (0x4000): Certificate verified and validated. 964s [p11_child[2262]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-11312-auth.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 964s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s + local verify_option=partial_chain 964s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_cn 964s + local key_name 964s + local tokens_dir 964s + local output_cert_file 964s + token_name= 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 964s + key_name=test-root-CA-trusted-certificate-0001 964s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s ++ sed -n 's/ *commonName *= //p' 964s + key_cn='Test Organization Root Trusted Certificate 0001' 964s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 964s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 964s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 964s + token_name='Test Organization Root Tr Token' 964s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 964s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 964s + echo 'Test Organization Root Tr Token' 964s Test Organization Root Tr Token 964s + '[' -n partial_chain ']' 964s + local verify_arg=--verify=partial_chain 964s + local output_base_name=SSSD-child-24424 964s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.pem 964s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 964s [p11_child[2272]] [main] (0x0400): p11_child started. 964s [p11_child[2272]] [main] (0x2000): Running in [pre-auth] mode. 964s [p11_child[2272]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2272]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2272]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 964s [p11_child[2272]] [do_card] (0x4000): Module List: 964s [p11_child[2272]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2272]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2272]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2272]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2272]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2272]] [do_card] (0x4000): Login NOT required. 964s [p11_child[2272]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2272]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2272]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2272]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2272]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s + local found_md5 expected_md5 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + expected_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.output 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.output .output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.pem 964s + echo -n 053350 964s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 964s [p11_child[2280]] [main] (0x0400): p11_child started. 964s [p11_child[2280]] [main] (0x2000): Running in [auth] mode. 964s [p11_child[2280]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2280]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2280]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 964s [p11_child[2280]] [do_card] (0x4000): Module List: 964s [p11_child[2280]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2280]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2280]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2280]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2280]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2280]] [do_card] (0x4000): Login required. 964s [p11_child[2280]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2280]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2280]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2280]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 964s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 964s [p11_child[2280]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 964s [p11_child[2280]] [do_card] (0x4000): Certificate verified and validated. 964s [p11_child[2280]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24424-auth.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s + local verify_option= 964s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_cn 964s + local key_name 964s + local tokens_dir 964s + local output_cert_file 964s + token_name= 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 964s + key_name=test-root-CA-trusted-certificate-0001 964s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s ++ sed -n 's/ *commonName *= //p' 964s + key_cn='Test Organization Root Trusted Certificate 0001' 964s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 964s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 964s Test Organization Root Tr Token 964s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 964s + token_name='Test Organization Root Tr Token' 964s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 964s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 964s + echo 'Test Organization Root Tr Token' 964s + '[' -n '' ']' 964s + local output_base_name=SSSD-child-31150 964s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.pem 964s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s [p11_child[2290]] [main] (0x0400): p11_child started. 964s [p11_child[2290]] [main] (0x2000): Running in [pre-auth] mode. 964s [p11_child[2290]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2290]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2290]] [do_card] (0x4000): Module List: 964s [p11_child[2290]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2290]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2290]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2290]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2290]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2290]] [do_card] (0x4000): Login NOT required. 964s [p11_child[2290]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2290]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2290]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2290]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2290]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s + local found_md5 expected_md5 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + expected_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.output 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.output .output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.pem 964s + echo -n 053350 964s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 964s [p11_child[2298]] [main] (0x0400): p11_child started. 964s [p11_child[2298]] [main] (0x2000): Running in [auth] mode. 964s [p11_child[2298]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2298]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2298]] [do_card] (0x4000): Module List: 964s [p11_child[2298]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2298]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2298]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2298]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2298]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2298]] [do_card] (0x4000): Login required. 964s [p11_child[2298]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2298]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2298]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2298]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 964s [p11_child[2298]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 964s [p11_child[2298]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 964s [p11_child[2298]] [do_card] (0x4000): Certificate verified and validated. 964s [p11_child[2298]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31150-auth.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 964s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s + local verify_option=partial_chain 964s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 964s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 964s + local key_cn 964s + local key_name 964s + local tokens_dir 964s + local output_cert_file 964s + token_name= 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 964s + key_name=test-root-CA-trusted-certificate-0001 964s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s ++ sed -n 's/ *commonName *= //p' 964s + key_cn='Test Organization Root Trusted Certificate 0001' 964s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 964s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 964s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 964s + token_name='Test Organization Root Tr Token' 964s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 964s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 964s + echo 'Test Organization Root Tr Token' 964s + '[' -n partial_chain ']' 964s + local verify_arg=--verify=partial_chain 964s + local output_base_name=SSSD-child-632 964s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.pem 964s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 964s Test Organization Root Tr Token 964s [p11_child[2308]] [main] (0x0400): p11_child started. 964s [p11_child[2308]] [main] (0x2000): Running in [pre-auth] mode. 964s [p11_child[2308]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2308]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2308]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 964s [p11_child[2308]] [do_card] (0x4000): Module List: 964s [p11_child[2308]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2308]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2308]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2308]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2308]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2308]] [do_card] (0x4000): Login NOT required. 964s [p11_child[2308]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2308]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2308]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2308]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2308]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s + local found_md5 expected_md5 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 964s + expected_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632.pem 964s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 964s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 964s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.output 964s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.output .output 964s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.pem 964s + echo -n 053350 964s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 964s [p11_child[2316]] [main] (0x0400): p11_child started. 964s [p11_child[2316]] [main] (0x2000): Running in [auth] mode. 964s [p11_child[2316]] [main] (0x2000): Running with effective IDs: [0][0]. 964s [p11_child[2316]] [main] (0x2000): Running with real IDs [0][0]. 964s [p11_child[2316]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 964s [p11_child[2316]] [do_card] (0x4000): Module List: 964s [p11_child[2316]] [do_card] (0x4000): common name: [softhsm2]. 964s [p11_child[2316]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2316]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 964s [p11_child[2316]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 964s [p11_child[2316]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 964s [p11_child[2316]] [do_card] (0x4000): Login required. 964s [p11_child[2316]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 964s [p11_child[2316]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 964s [p11_child[2316]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 964s [p11_child[2316]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x76bf2124;slot-manufacturer=SoftHSM%20project;slot-id=1992237348;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4c861b0876bf2124;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 964s [p11_child[2316]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 964s [p11_child[2316]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 964s [p11_child[2316]] [do_card] (0x4000): Certificate verified and validated. 964s [p11_child[2316]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 964s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.output 964s + echo '-----BEGIN CERTIFICATE-----' 964s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.output 964s + echo '-----END CERTIFICATE-----' 964s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.pem 964s Certificate: 964s Data: 964s Version: 3 (0x2) 964s Serial Number: 3 (0x3) 964s Signature Algorithm: sha256WithRSAEncryption 964s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 964s Validity 964s Not Before: Mar 13 18:43:22 2024 GMT 964s Not After : Mar 13 18:43:22 2025 GMT 964s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 964s Subject Public Key Info: 964s Public Key Algorithm: rsaEncryption 964s Public-Key: (1024 bit) 964s Modulus: 964s 00:e1:0f:1a:e9:71:40:8b:c6:18:0b:39:8b:51:cc: 964s a7:d3:82:93:3f:67:3a:97:b1:12:93:72:2a:fc:5c: 964s 7b:9d:42:5a:f2:aa:01:a1:f1:cc:25:e4:85:de:18: 964s 33:40:94:a2:8d:b5:6d:71:87:81:d2:dc:be:04:08: 964s 62:7f:ad:93:21:0f:33:1c:57:f5:4d:ca:28:a9:0d: 964s 24:fe:48:a0:5e:78:b0:12:7b:5a:43:0f:62:fd:d8: 964s 71:5c:61:8c:09:ea:9a:89:98:90:4f:96:dd:ce:d3: 964s ad:10:75:4c:1b:62:f7:ab:3a:01:aa:ad:6e:08:88: 964s 04:bc:31:02:20:d7:df:0f:65 964s Exponent: 65537 (0x10001) 964s X509v3 extensions: 964s X509v3 Authority Key Identifier: 964s 83:8C:0B:CA:9B:C7:06:98:C2:BC:B1:CD:53:7B:F8:71:68:9B:64:57 964s X509v3 Basic Constraints: 964s CA:FALSE 964s Netscape Cert Type: 964s SSL Client, S/MIME 964s Netscape Comment: 964s Test Organization Root CA trusted Certificate 964s X509v3 Subject Key Identifier: 964s 01:10:A4:0A:21:4D:EC:D9:E7:AE:E2:97:08:5C:20:10:64:E5:8D:30 964s X509v3 Key Usage: critical 964s Digital Signature, Non Repudiation, Key Encipherment 964s X509v3 Extended Key Usage: 964s TLS Web Client Authentication, E-mail Protection 964s X509v3 Subject Alternative Name: 964s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 964s Signature Algorithm: sha256WithRSAEncryption 964s Signature Value: 964s 6f:13:3f:6c:7a:7b:72:b8:64:1b:ce:87:1e:0d:9d:6b:dc:d5: 964s 5e:4b:d1:13:be:07:61:ac:f6:d0:29:3d:21:2e:d0:09:3a:21: 964s fb:61:02:f1:7e:75:ef:a8:e4:69:aa:b4:62:c0:0f:6d:b1:03: 964s 0a:f1:04:00:c0:43:e8:67:f3:03:95:ab:99:69:a5:3a:26:85: 964s 8a:8a:cf:df:4c:5c:c3:9d:67:18:9b:c9:0c:3c:64:e4:1c:11: 964s d5:63:58:ff:35:5e:be:fa:00:f6:72:27:0f:65:1b:56:32:be: 964s 19:bf:02:1d:a0:50:90:a6:54:23:aa:8f:e3:0c:c0:7e:d9:70: 964s 2f:6b 964s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-632-auth.pem 965s + found_md5=Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 965s + '[' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 '!=' Modulus=E10F1AE971408BC6180B398B51CCA7D382933F673A97B11293722AFC5C7B9D425AF2AA01A1F1CC25E485DE18334094A28DB56D718781D2DCBE0408627FAD93210F331C57F54DCA28A90D24FE48A05E78B0127B5A430F62FDD8715C618C09EA9A8998904F96DDCED3AD10754C1B62F7AB3A01AAAD6E088804BC310220D7DF0F65 ']' 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + local verify_option= 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-root-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Root Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 965s + token_name='Test Organization Root Tr Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Root Tr Token' 965s + '[' -n '' ']' 965s + local output_base_name=SSSD-child-30773 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-30773.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-30773.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s Test Organization Root Tr Token 965s [p11_child[2326]] [main] (0x0400): p11_child started. 965s [p11_child[2326]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2326]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2326]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2326]] [do_card] (0x4000): Module List: 965s [p11_child[2326]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2326]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2326]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2326]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 965s [p11_child[2326]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2326]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2326]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 965s [p11_child[2326]] [do_verification] (0x0040): X509_verify_cert failed [0]. 965s [p11_child[2326]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 965s [p11_child[2326]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 965s [p11_child[2326]] [do_card] (0x4000): No certificate found. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-30773.output 965s + return 2 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem partial_chain 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem partial_chain 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + local verify_option=partial_chain 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8294 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-root-ca-trusted-cert-0001-8294 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-root-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-root-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Root Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 965s + token_name='Test Organization Root Tr Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-root-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Root Tr Token' 965s + '[' -n partial_chain ']' 965s + local verify_arg=--verify=partial_chain 965s + local output_base_name=SSSD-child-26829 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-26829.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-26829.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s Test Organization Root Tr Token 965s [p11_child[2333]] [main] (0x0400): p11_child started. 965s [p11_child[2333]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2333]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2333]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2333]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 965s [p11_child[2333]] [do_card] (0x4000): Module List: 965s [p11_child[2333]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2333]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2333]] [do_card] (0x4000): Description [SoftHSM slot ID 0x76bf2124] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2333]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 965s [p11_child[2333]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x76bf2124][1992237348] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2333]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2333]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 965s [p11_child[2333]] [do_verification] (0x0040): X509_verify_cert failed [0]. 965s [p11_child[2333]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 965s [p11_child[2333]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 965s [p11_child[2333]] [do_card] (0x4000): No certificate found. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-26829.output 965s + return 2 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /dev/null 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /dev/null 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/dev/null 965s + local verify_option= 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + local key_file 965s + local decrypted_key 965s + mkdir -p /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + key_file=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key.pem 965s + decrypted_key=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 965s + cat 965s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 965s Slot 0 has a free/uninitialized token. 965s The token has been initialized and is reassigned to slot 1365224799 965s + softhsm2-util --show-slots 965s Available slots: 965s Slot 1365224799 965s Slot info: 965s Description: SoftHSM slot ID 0x515fad5f 965s Manufacturer ID: SoftHSM project 965s Hardware version: 2.6 965s Firmware version: 2.6 965s Token present: yes 965s Token info: 965s Manufacturer ID: SoftHSM project 965s Model: SoftHSM v2 965s Hardware version: 2.6 965s Firmware version: 2.6 965s Serial number: 523bc522515fad5f 965s Initialized: yes 965s User PIN init.: yes 965s Label: Test Organization Interme Token 965s Slot 1 965s Slot info: 965s Description: SoftHSM slot ID 0x1 965s Manufacturer ID: SoftHSM project 965s Hardware version: 2.6 965s Firmware version: 2.6 965s Token present: yes 965s Token info: 965s Manufacturer ID: SoftHSM project 965s Model: SoftHSM v2 965s Hardware version: 2.6 965s Firmware version: 2.6 965s Serial number: 965s Initialized: no 965s User PIN init.: no 965s Label: 965s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 965s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-2928 -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 965s writing RSA key 965s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 965s + rm /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 965s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 965s + echo 'Test Organization Interme Token' 965s + '[' -n '' ']' 965s + local output_base_name=SSSD-child-12240 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-12240.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-12240.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 965s Object 0: 965s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 965s Type: X.509 Certificate (RSA-1024) 965s Expires: Thu Mar 13 18:43:22 2025 965s Label: Test Organization Intermediate Trusted Certificate 0001 965s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 965s 965s Test Organization Interme Token 965s [p11_child[2349]] [main] (0x0400): p11_child started. 965s [p11_child[2349]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2349]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2349]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2349]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 965s [p11_child[2349]] [do_work] (0x0040): init_verification failed. 965s [p11_child[2349]] [main] (0x0020): p11_child failed (5) 965s + return 2 965s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /dev/null no_verification 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /dev/null no_verification 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/dev/null 965s + local verify_option=no_verification 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Interme Token' 965s + '[' -n no_verification ']' 965s + local verify_arg=--verify=no_verification 965s + local output_base_name=SSSD-child-7702 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 965s Test Organization Interme Token 965s [p11_child[2355]] [main] (0x0400): p11_child started. 965s [p11_child[2355]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2355]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2355]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2355]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 965s [p11_child[2355]] [do_card] (0x4000): Module List: 965s [p11_child[2355]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2355]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2355]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2355]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2355]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2355]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2355]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2355]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2355]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2355]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.pem 965s + local found_md5 expected_md5 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s + expected_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.output 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.output .output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.pem 965s + echo -n 053350 965s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 965s [p11_child[2363]] [main] (0x0400): p11_child started. 965s [p11_child[2363]] [main] (0x2000): Running in [auth] mode. 965s [p11_child[2363]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2363]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2363]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 965s [p11_child[2363]] [do_card] (0x4000): Module List: 965s [p11_child[2363]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2363]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2363]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2363]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2363]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2363]] [do_card] (0x4000): Login required. 965s [p11_child[2363]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2363]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2363]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 965s [p11_child[2363]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 965s [p11_child[2363]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 965s [p11_child[2363]] [do_card] (0x4000): Certificate verified and validated. 965s [p11_child[2363]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-7702-auth.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s + local verify_option= 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Interme Token' 965s + '[' -n '' ']' 965s + local output_base_name=SSSD-child-25299 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-25299.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-25299.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s Test Organization Interme Token 965s [p11_child[2373]] [main] (0x0400): p11_child started. 965s [p11_child[2373]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2373]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2373]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2373]] [do_card] (0x4000): Module List: 965s [p11_child[2373]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2373]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2373]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2373]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2373]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2373]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2373]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2373]] [do_verification] (0x0040): X509_verify_cert failed [0]. 965s [p11_child[2373]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 965s [p11_child[2373]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 965s [p11_child[2373]] [do_card] (0x4000): No certificate found. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-25299.output 965s + return 2 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s + local verify_option=partial_chain 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Interme Token' 965s + '[' -n partial_chain ']' 965s + local verify_arg=--verify=partial_chain 965s + local output_base_name=SSSD-child-21397 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21397.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21397.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 965s Test Organization Interme Token 965s [p11_child[2380]] [main] (0x0400): p11_child started. 965s [p11_child[2380]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2380]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2380]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2380]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 965s [p11_child[2380]] [do_card] (0x4000): Module List: 965s [p11_child[2380]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2380]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2380]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2380]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2380]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2380]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2380]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2380]] [do_verification] (0x0040): X509_verify_cert failed [0]. 965s [p11_child[2380]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 965s [p11_child[2380]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 965s [p11_child[2380]] [do_card] (0x4000): No certificate found. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21397.output 965s + return 2 965s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s + local verify_option= 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s Test Organization Interme Token 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Interme Token' 965s + '[' -n '' ']' 965s + local output_base_name=SSSD-child-21185 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s [p11_child[2387]] [main] (0x0400): p11_child started. 965s [p11_child[2387]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2387]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2387]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2387]] [do_card] (0x4000): Module List: 965s [p11_child[2387]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2387]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2387]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2387]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2387]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2387]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2387]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2387]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 965s [p11_child[2387]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2387]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2387]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s + local found_md5 expected_md5 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + expected_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.output 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.output .output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.pem 965s + echo -n 053350 965s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 965s [p11_child[2395]] [main] (0x0400): p11_child started. 965s [p11_child[2395]] [main] (0x2000): Running in [auth] mode. 965s [p11_child[2395]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2395]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2395]] [do_card] (0x4000): Module List: 965s [p11_child[2395]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2395]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2395]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2395]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2395]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2395]] [do_card] (0x4000): Login required. 965s [p11_child[2395]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2395]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 965s [p11_child[2395]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2395]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 965s [p11_child[2395]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 965s [p11_child[2395]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 965s [p11_child[2395]] [do_card] (0x4000): Certificate verified and validated. 965s [p11_child[2395]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-21185-auth.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s + local verify_option=partial_chain 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 965s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s ++ sed -n 's/ *commonName *= //p' 965s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 965s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 965s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 965s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 965s + token_name='Test Organization Interme Token' 965s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 965s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 965s + echo 'Test Organization Interme Token' 965s + '[' -n partial_chain ']' 965s + local verify_arg=--verify=partial_chain 965s + local output_base_name=SSSD-child-32158 965s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.pem 965s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 965s Test Organization Interme Token 965s [p11_child[2405]] [main] (0x0400): p11_child started. 965s [p11_child[2405]] [main] (0x2000): Running in [pre-auth] mode. 965s [p11_child[2405]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2405]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2405]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 965s [p11_child[2405]] [do_card] (0x4000): Module List: 965s [p11_child[2405]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2405]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2405]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2405]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2405]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2405]] [do_card] (0x4000): Login NOT required. 965s [p11_child[2405]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2405]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 965s [p11_child[2405]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2405]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2405]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s + local found_md5 expected_md5 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + expected_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.output 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.output .output 965s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.pem 965s + echo -n 053350 965s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 965s [p11_child[2413]] [main] (0x0400): p11_child started. 965s [p11_child[2413]] [main] (0x2000): Running in [auth] mode. 965s [p11_child[2413]] [main] (0x2000): Running with effective IDs: [0][0]. 965s [p11_child[2413]] [main] (0x2000): Running with real IDs [0][0]. 965s [p11_child[2413]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 965s [p11_child[2413]] [do_card] (0x4000): Module List: 965s [p11_child[2413]] [do_card] (0x4000): common name: [softhsm2]. 965s [p11_child[2413]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2413]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 965s [p11_child[2413]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 965s [p11_child[2413]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 965s [p11_child[2413]] [do_card] (0x4000): Login required. 965s [p11_child[2413]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 965s [p11_child[2413]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 965s [p11_child[2413]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 965s [p11_child[2413]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 965s [p11_child[2413]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 965s [p11_child[2413]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 965s [p11_child[2413]] [do_card] (0x4000): Certificate verified and validated. 965s [p11_child[2413]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 965s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.output 965s + echo '-----BEGIN CERTIFICATE-----' 965s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.output 965s + echo '-----END CERTIFICATE-----' 965s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.pem 965s Certificate: 965s Data: 965s Version: 3 (0x2) 965s Serial Number: 4 (0x4) 965s Signature Algorithm: sha256WithRSAEncryption 965s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 965s Validity 965s Not Before: Mar 13 18:43:22 2024 GMT 965s Not After : Mar 13 18:43:22 2025 GMT 965s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 965s Subject Public Key Info: 965s Public Key Algorithm: rsaEncryption 965s Public-Key: (1024 bit) 965s Modulus: 965s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 965s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 965s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 965s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 965s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 965s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 965s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 965s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 965s 60:b8:22:02:54:30:2a:44:e1 965s Exponent: 65537 (0x10001) 965s X509v3 extensions: 965s X509v3 Authority Key Identifier: 965s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 965s X509v3 Basic Constraints: 965s CA:FALSE 965s Netscape Cert Type: 965s SSL Client, S/MIME 965s Netscape Comment: 965s Test Organization Intermediate CA trusted Certificate 965s X509v3 Subject Key Identifier: 965s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 965s X509v3 Key Usage: critical 965s Digital Signature, Non Repudiation, Key Encipherment 965s X509v3 Extended Key Usage: 965s TLS Web Client Authentication, E-mail Protection 965s X509v3 Subject Alternative Name: 965s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 965s Signature Algorithm: sha256WithRSAEncryption 965s Signature Value: 965s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 965s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 965s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 965s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 965s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 965s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 965s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 965s db:d1 965s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-32158-auth.pem 965s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 965s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 965s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 965s + local verify_option= 965s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 965s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 965s + local key_cn 965s + local key_name 965s + local tokens_dir 965s + local output_cert_file 965s + token_name= 965s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 965s + key_name=test-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Interme Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Interme Token' 966s + '[' -n '' ']' 966s + local output_base_name=SSSD-child-14881 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-14881.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-14881.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 966s Test Organization Interme Token 966s [p11_child[2423]] [main] (0x0400): p11_child started. 966s [p11_child[2423]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2423]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2423]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2423]] [do_card] (0x4000): Module List: 966s [p11_child[2423]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2423]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2423]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2423]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 966s [p11_child[2423]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2423]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2423]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 966s [p11_child[2423]] [do_verification] (0x0040): X509_verify_cert failed [0]. 966s [p11_child[2423]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 966s [p11_child[2423]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 966s [p11_child[2423]] [do_card] (0x4000): No certificate found. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-14881.output 966s + return 2 966s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem partial_chain 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem partial_chain 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 966s + local verify_option=partial_chain 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-2928 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-2928 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Interme Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Interme Token' 966s + '[' -n partial_chain ']' 966s + local verify_arg=--verify=partial_chain 966s + local output_base_name=SSSD-child-17943 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem 966s Test Organization Interme Token 966s [p11_child[2430]] [main] (0x0400): p11_child started. 966s [p11_child[2430]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2430]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2430]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2430]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2430]] [do_card] (0x4000): Module List: 966s [p11_child[2430]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2430]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2430]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2430]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 966s [p11_child[2430]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2430]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2430]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 966s [p11_child[2430]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2430]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2430]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2430]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 4 (0x4) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 966s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 966s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 966s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 966s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 966s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 966s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 966s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 966s 60:b8:22:02:54:30:2a:44:e1 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 966s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 966s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 966s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 966s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 966s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 966s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 966s db:d1 966s + local found_md5 expected_md5 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA-trusted-certificate-0001.pem 966s + expected_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943.pem 966s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 966s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 966s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.output 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.output .output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.pem 966s + echo -n 053350 966s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 966s [p11_child[2438]] [main] (0x0400): p11_child started. 966s [p11_child[2438]] [main] (0x2000): Running in [auth] mode. 966s [p11_child[2438]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2438]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2438]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2438]] [do_card] (0x4000): Module List: 966s [p11_child[2438]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2438]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2438]] [do_card] (0x4000): Description [SoftHSM slot ID 0x515fad5f] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2438]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 966s [p11_child[2438]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x515fad5f][1365224799] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2438]] [do_card] (0x4000): Login required. 966s [p11_child[2438]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 966s [p11_child[2438]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2438]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2438]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x515fad5f;slot-manufacturer=SoftHSM%20project;slot-id=1365224799;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=523bc522515fad5f;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 966s [p11_child[2438]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 966s [p11_child[2438]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 966s [p11_child[2438]] [do_card] (0x4000): Certificate verified and validated. 966s [p11_child[2438]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 4 (0x4) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:b5:a2:d7:2e:cd:6c:a0:32:55:fd:9c:31:67:97: 966s 10:db:cd:06:c0:0a:81:ab:24:97:8f:1e:03:87:54: 966s 88:a6:f6:da:2d:6c:60:33:fc:8e:47:ab:d9:22:44: 966s cc:bf:25:72:fa:0e:be:e5:2b:b1:b5:e1:5e:a3:29: 966s a6:f1:cb:98:b5:c7:56:19:c1:5e:f5:e9:a7:f4:3f: 966s ae:09:fb:25:7f:da:41:97:bb:0d:8e:ad:bd:38:bd: 966s be:26:9c:cc:87:17:ea:3f:b7:21:17:8d:46:a1:25: 966s 74:a1:e1:4d:c4:06:8f:9f:bd:f8:99:f5:23:d1:2c: 966s 60:b8:22:02:54:30:2a:44:e1 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s EF:82:93:A1:D1:C5:73:9A:71:34:19:B7:30:47:A4:5C:0E:F4:9F:D1 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 94:31:C9:3F:CB:90:69:BC:09:54:50:BA:3A:F1:46:85:B7:D4:50:18 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s c0:b3:b1:69:08:a9:21:87:fd:8d:d2:d5:0c:78:a3:1c:e3:c0: 966s 29:00:83:83:57:53:15:7a:11:8a:5c:47:93:ef:35:f0:59:5a: 966s 83:9c:5d:75:c8:95:98:f6:12:4f:f0:de:57:35:fd:d6:0d:14: 966s 04:6e:bd:72:c8:3c:6f:f8:bb:ef:18:43:5b:6d:7e:5b:74:fc: 966s 2e:7e:45:33:6f:29:d2:9d:fb:2a:8d:e8:91:ca:30:5a:c2:be: 966s 2e:dd:70:f4:30:fd:7a:dc:07:e2:35:bd:a3:ab:48:7b:ed:75: 966s f9:b8:06:65:e1:56:a9:ae:b0:7f:12:39:e8:a8:4e:e0:e9:72: 966s db:d1 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-17943-auth.pem 966s + found_md5=Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 966s + '[' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 '!=' Modulus=B5A2D72ECD6CA03255FD9C31679710DBCD06C00A81AB24978F1E03875488A6F6DA2D6C6033FC8E47ABD92244CCBF2572FA0EBEE52BB1B5E15EA329A6F1CB98B5C75619C15EF5E9A7F43FAE09FB257FDA4197BB0D8EADBD38BDBE269CCC8717EA3FB721178D46A12574A1E14DC4068F9FBDF899F523D12C60B8220254302A44E1 ']' 966s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s + local verify_option= 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + local key_file 966s + local decrypted_key 966s + mkdir -p /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + key_file=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 966s + decrypted_key=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 966s + cat 966s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 966s Slot 0 has a free/uninitialized token. 966s The token has been initialized and is reassigned to slot 347599453 966s + softhsm2-util --show-slots 966s Available slots: 966s Slot 347599453 966s Slot info: 966s Description: SoftHSM slot ID 0x14b7f25d 966s Manufacturer ID: SoftHSM project 966s Hardware version: 2.6 966s Firmware version: 2.6 966s Token present: yes 966s Token info: 966s Manufacturer ID: SoftHSM project 966s Model: SoftHSM v2 966s Hardware version: 2.6 966s Firmware version: 2.6 966s Serial number: 377cf8c894b7f25d 966s Initialized: yes 966s User PIN init.: yes 966s Label: Test Organization Sub Int Token 966s Slot 1 966s Slot info: 966s Description: SoftHSM slot ID 0x1 966s Manufacturer ID: SoftHSM project 966s Hardware version: 2.6 966s Firmware version: 2.6 966s Token present: yes 966s Token info: 966s Manufacturer ID: SoftHSM project 966s Model: SoftHSM v2 966s Hardware version: 2.6 966s Firmware version: 2.6 966s Serial number: 966s Initialized: no 966s User PIN init.: no 966s Label: 966s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 966s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10794 -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 966s writing RSA key 966s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 966s + rm /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 966s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 966s Object 0: 966s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 966s Type: X.509 Certificate (RSA-1024) 966s Expires: Thu Mar 13 18:43:22 2025 966s Label: Test Organization Sub Intermediate Trusted Certificate 0001 966s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 966s 966s Test Organization Sub Int Token 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n '' ']' 966s + local output_base_name=SSSD-child-31348 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31348.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-31348.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s [p11_child[2457]] [main] (0x0400): p11_child started. 966s [p11_child[2457]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2457]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2457]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2457]] [do_card] (0x4000): Module List: 966s [p11_child[2457]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2457]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2457]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2457]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2457]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2457]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2457]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2457]] [do_verification] (0x0040): X509_verify_cert failed [0]. 966s [p11_child[2457]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 966s [p11_child[2457]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 966s [p11_child[2457]] [do_card] (0x4000): No certificate found. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-31348.output 966s + return 2 966s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem partial_chain 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s + local verify_option=partial_chain 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n partial_chain ']' 966s + local verify_arg=--verify=partial_chain 966s + local output_base_name=SSSD-child-2530 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-2530.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-2530.pem 966s Test Organization Sub Int Token 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-CA.pem 966s [p11_child[2464]] [main] (0x0400): p11_child started. 966s [p11_child[2464]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2464]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2464]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2464]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2464]] [do_card] (0x4000): Module List: 966s [p11_child[2464]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2464]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2464]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2464]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2464]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2464]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2464]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2464]] [do_verification] (0x0040): X509_verify_cert failed [0]. 966s [p11_child[2464]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 966s [p11_child[2464]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 966s [p11_child[2464]] [do_card] (0x4000): No certificate found. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-2530.output 966s + return 2 966s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s + local verify_option= 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s Test Organization Sub Int Token 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n '' ']' 966s + local output_base_name=SSSD-child-20583 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s [p11_child[2471]] [main] (0x0400): p11_child started. 966s [p11_child[2471]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2471]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2471]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2471]] [do_card] (0x4000): Module List: 966s [p11_child[2471]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2471]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2471]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2471]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2471]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2471]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2471]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2471]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2471]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2471]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2471]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 5 (0x5) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 966s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 966s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 966s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 966s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 966s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 966s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 966s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 966s 75:3d:06:43:04:fc:51:dd:41 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Sub Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 966s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 966s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 966s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 966s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 966s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 966s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 966s a5:40 966s + local found_md5 expected_md5 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + expected_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583.pem 966s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 966s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.output 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.output .output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.pem 966s + echo -n 053350 966s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 966s [p11_child[2479]] [main] (0x0400): p11_child started. 966s [p11_child[2479]] [main] (0x2000): Running in [auth] mode. 966s [p11_child[2479]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2479]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2479]] [do_card] (0x4000): Module List: 966s [p11_child[2479]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2479]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2479]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2479]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2479]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2479]] [do_card] (0x4000): Login required. 966s [p11_child[2479]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2479]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2479]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2479]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 966s [p11_child[2479]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 966s [p11_child[2479]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 966s [p11_child[2479]] [do_card] (0x4000): Certificate verified and validated. 966s [p11_child[2479]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 5 (0x5) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 966s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 966s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 966s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 966s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 966s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 966s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 966s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 966s 75:3d:06:43:04:fc:51:dd:41 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Sub Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 966s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 966s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 966s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 966s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 966s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 966s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 966s a5:40 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-20583-auth.pem 966s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 966s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem partial_chain 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s + local verify_option=partial_chain 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s Test Organization Sub Int Token 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n partial_chain ']' 966s + local verify_arg=--verify=partial_chain 966s + local output_base_name=SSSD-child-34 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem 966s [p11_child[2489]] [main] (0x0400): p11_child started. 966s [p11_child[2489]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2489]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2489]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2489]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2489]] [do_card] (0x4000): Module List: 966s [p11_child[2489]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2489]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2489]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2489]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2489]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2489]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2489]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2489]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2489]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2489]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2489]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 5 (0x5) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 966s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 966s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 966s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 966s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 966s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 966s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 966s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 966s 75:3d:06:43:04:fc:51:dd:41 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Sub Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 966s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 966s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 966s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 966s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 966s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 966s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 966s a5:40 966s + local found_md5 expected_md5 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + expected_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34.pem 966s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 966s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.output 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.output .output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.pem 966s + echo -n 053350 966s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 966s [p11_child[2497]] [main] (0x0400): p11_child started. 966s [p11_child[2497]] [main] (0x2000): Running in [auth] mode. 966s [p11_child[2497]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2497]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2497]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2497]] [do_card] (0x4000): Module List: 966s [p11_child[2497]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2497]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2497]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2497]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2497]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2497]] [do_card] (0x4000): Login required. 966s [p11_child[2497]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2497]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 966s [p11_child[2497]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 966s [p11_child[2497]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 966s [p11_child[2497]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 966s [p11_child[2497]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 966s [p11_child[2497]] [do_card] (0x4000): Certificate verified and validated. 966s [p11_child[2497]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.output 966s + echo '-----BEGIN CERTIFICATE-----' 966s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.output 966s + echo '-----END CERTIFICATE-----' 966s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.pem 966s Certificate: 966s Data: 966s Version: 3 (0x2) 966s Serial Number: 5 (0x5) 966s Signature Algorithm: sha256WithRSAEncryption 966s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 966s Validity 966s Not Before: Mar 13 18:43:22 2024 GMT 966s Not After : Mar 13 18:43:22 2025 GMT 966s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 966s Subject Public Key Info: 966s Public Key Algorithm: rsaEncryption 966s Public-Key: (1024 bit) 966s Modulus: 966s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 966s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 966s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 966s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 966s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 966s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 966s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 966s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 966s 75:3d:06:43:04:fc:51:dd:41 966s Exponent: 65537 (0x10001) 966s X509v3 extensions: 966s X509v3 Authority Key Identifier: 966s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 966s X509v3 Basic Constraints: 966s CA:FALSE 966s Netscape Cert Type: 966s SSL Client, S/MIME 966s Netscape Comment: 966s Test Organization Sub Intermediate CA trusted Certificate 966s X509v3 Subject Key Identifier: 966s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 966s X509v3 Key Usage: critical 966s Digital Signature, Non Repudiation, Key Encipherment 966s X509v3 Extended Key Usage: 966s TLS Web Client Authentication, E-mail Protection 966s X509v3 Subject Alternative Name: 966s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 966s Signature Algorithm: sha256WithRSAEncryption 966s Signature Value: 966s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 966s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 966s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 966s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 966s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 966s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 966s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 966s a5:40 966s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-34-auth.pem 966s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 966s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 966s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 966s + local verify_option= 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s Test Organization Sub Int Token 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n '' ']' 966s + local output_base_name=SSSD-child-25913 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-25913.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-25913.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 966s [p11_child[2507]] [main] (0x0400): p11_child started. 966s [p11_child[2507]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2507]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2507]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2507]] [do_card] (0x4000): Module List: 966s [p11_child[2507]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2507]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2507]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2507]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2507]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2507]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2507]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2507]] [do_verification] (0x0040): X509_verify_cert failed [0]. 966s [p11_child[2507]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 966s [p11_child[2507]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 966s [p11_child[2507]] [do_card] (0x4000): No certificate found. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-25913.output 966s + return 2 966s + invalid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem partial_chain 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem partial_chain 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem 966s + local verify_option=partial_chain 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 966s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 966s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 966s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 966s Test Organization Sub Int Token 966s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 966s + token_name='Test Organization Sub Int Token' 966s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 966s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 966s + echo 'Test Organization Sub Int Token' 966s + '[' -n partial_chain ']' 966s + local verify_arg=--verify=partial_chain 966s + local output_base_name=SSSD-child-8023 966s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-8023.output 966s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-8023.pem 966s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-root-intermediate-chain-CA.pem 966s [p11_child[2514]] [main] (0x0400): p11_child started. 966s [p11_child[2514]] [main] (0x2000): Running in [pre-auth] mode. 966s [p11_child[2514]] [main] (0x2000): Running with effective IDs: [0][0]. 966s [p11_child[2514]] [main] (0x2000): Running with real IDs [0][0]. 966s [p11_child[2514]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 966s [p11_child[2514]] [do_card] (0x4000): Module List: 966s [p11_child[2514]] [do_card] (0x4000): common name: [softhsm2]. 966s [p11_child[2514]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2514]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 966s [p11_child[2514]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 966s [p11_child[2514]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 966s [p11_child[2514]] [do_card] (0x4000): Login NOT required. 966s [p11_child[2514]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 966s [p11_child[2514]] [do_verification] (0x0040): X509_verify_cert failed [0]. 966s [p11_child[2514]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 966s [p11_child[2514]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 966s [p11_child[2514]] [do_card] (0x4000): No certificate found. 966s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-8023.output 966s + return 2 966s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem partial_chain 966s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem partial_chain 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 966s + local verify_option=partial_chain 966s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 966s + local key_cn 966s + local key_name 966s + local tokens_dir 966s + local output_cert_file 966s + token_name= 966s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 966s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 966s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 966s ++ sed -n 's/ *commonName *= //p' 967s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 967s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 967s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 967s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 967s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 967s Test Organization Sub Int Token 967s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 967s + token_name='Test Organization Sub Int Token' 967s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 967s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 967s + echo 'Test Organization Sub Int Token' 967s + '[' -n partial_chain ']' 967s + local verify_arg=--verify=partial_chain 967s + local output_base_name=SSSD-child-24372 967s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.output 967s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.pem 967s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem 967s [p11_child[2521]] [main] (0x0400): p11_child started. 967s [p11_child[2521]] [main] (0x2000): Running in [pre-auth] mode. 967s [p11_child[2521]] [main] (0x2000): Running with effective IDs: [0][0]. 967s [p11_child[2521]] [main] (0x2000): Running with real IDs [0][0]. 967s [p11_child[2521]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 967s [p11_child[2521]] [do_card] (0x4000): Module List: 967s [p11_child[2521]] [do_card] (0x4000): common name: [softhsm2]. 967s [p11_child[2521]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2521]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 967s [p11_child[2521]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 967s [p11_child[2521]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2521]] [do_card] (0x4000): Login NOT required. 967s [p11_child[2521]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 967s [p11_child[2521]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 967s [p11_child[2521]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 967s [p11_child[2521]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 967s [p11_child[2521]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 967s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.output 967s + echo '-----BEGIN CERTIFICATE-----' 967s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.output 967s + echo '-----END CERTIFICATE-----' 967s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.pem 967s Certificate: 967s Data: 967s Version: 3 (0x2) 967s Serial Number: 5 (0x5) 967s Signature Algorithm: sha256WithRSAEncryption 967s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 967s Validity 967s Not Before: Mar 13 18:43:22 2024 GMT 967s Not After : Mar 13 18:43:22 2025 GMT 967s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 967s Subject Public Key Info: 967s Public Key Algorithm: rsaEncryption 967s Public-Key: (1024 bit) 967s Modulus: 967s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 967s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 967s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 967s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 967s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 967s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 967s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 967s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 967s 75:3d:06:43:04:fc:51:dd:41 967s Exponent: 65537 (0x10001) 967s X509v3 extensions: 967s X509v3 Authority Key Identifier: 967s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 967s X509v3 Basic Constraints: 967s CA:FALSE 967s Netscape Cert Type: 967s SSL Client, S/MIME 967s Netscape Comment: 967s Test Organization Sub Intermediate CA trusted Certificate 967s X509v3 Subject Key Identifier: 967s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 967s X509v3 Key Usage: critical 967s Digital Signature, Non Repudiation, Key Encipherment 967s X509v3 Extended Key Usage: 967s TLS Web Client Authentication, E-mail Protection 967s X509v3 Subject Alternative Name: 967s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 967s Signature Algorithm: sha256WithRSAEncryption 967s Signature Value: 967s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 967s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 967s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 967s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 967s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 967s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 967s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 967s a5:40 967s + local found_md5 expected_md5 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 967s + expected_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372.pem 967s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 967s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.output 967s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.output .output 967s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.pem 967s + echo -n 053350 967s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 967s [p11_child[2529]] [main] (0x0400): p11_child started. 967s [p11_child[2529]] [main] (0x2000): Running in [auth] mode. 967s [p11_child[2529]] [main] (0x2000): Running with effective IDs: [0][0]. 967s [p11_child[2529]] [main] (0x2000): Running with real IDs [0][0]. 967s [p11_child[2529]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 967s [p11_child[2529]] [do_card] (0x4000): Module List: 967s [p11_child[2529]] [do_card] (0x4000): common name: [softhsm2]. 967s [p11_child[2529]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2529]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 967s [p11_child[2529]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 967s [p11_child[2529]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2529]] [do_card] (0x4000): Login required. 967s [p11_child[2529]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 967s [p11_child[2529]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 967s [p11_child[2529]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 967s [p11_child[2529]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 967s [p11_child[2529]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 967s [p11_child[2529]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 967s [p11_child[2529]] [do_card] (0x4000): Certificate verified and validated. 967s [p11_child[2529]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 967s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.output 967s + echo '-----BEGIN CERTIFICATE-----' 967s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.output 967s + echo '-----END CERTIFICATE-----' 967s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.pem 967s Certificate: 967s Data: 967s Version: 3 (0x2) 967s Serial Number: 5 (0x5) 967s Signature Algorithm: sha256WithRSAEncryption 967s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 967s Validity 967s Not Before: Mar 13 18:43:22 2024 GMT 967s Not After : Mar 13 18:43:22 2025 GMT 967s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 967s Subject Public Key Info: 967s Public Key Algorithm: rsaEncryption 967s Public-Key: (1024 bit) 967s Modulus: 967s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 967s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 967s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 967s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 967s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 967s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 967s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 967s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 967s 75:3d:06:43:04:fc:51:dd:41 967s Exponent: 65537 (0x10001) 967s X509v3 extensions: 967s X509v3 Authority Key Identifier: 967s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 967s X509v3 Basic Constraints: 967s CA:FALSE 967s Netscape Cert Type: 967s SSL Client, S/MIME 967s Netscape Comment: 967s Test Organization Sub Intermediate CA trusted Certificate 967s X509v3 Subject Key Identifier: 967s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 967s X509v3 Key Usage: critical 967s Digital Signature, Non Repudiation, Key Encipherment 967s X509v3 Extended Key Usage: 967s TLS Web Client Authentication, E-mail Protection 967s X509v3 Subject Alternative Name: 967s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 967s Signature Algorithm: sha256WithRSAEncryption 967s Signature Value: 967s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 967s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 967s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 967s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 967s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 967s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 967s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 967s a5:40 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-24372-auth.pem 967s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 967s + valid_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-sub-chain-CA.pem partial_chain 967s + check_certificate /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 /tmp/sssd-softhsm2-rYVL6z/test-intermediate-sub-chain-CA.pem partial_chain 967s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 967s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 967s + local key_ring=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-sub-chain-CA.pem 967s + local verify_option=partial_chain 967s + prepare_softhsm2_card /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10794 967s + local certificate=/tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 967s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10794 967s + local key_cn 967s + local key_name 967s + local tokens_dir 967s + local output_cert_file 967s + token_name= 967s ++ basename /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 967s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 967s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 967s ++ sed -n 's/ *commonName *= //p' 967s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 967s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 967s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 967s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 967s ++ basename /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 967s + tokens_dir=/tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 967s + token_name='Test Organization Sub Int Token' 967s + '[' '!' -e /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 967s + '[' '!' -d /tmp/sssd-softhsm2-rYVL6z/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 967s + echo 'Test Organization Sub Int Token' 967s + '[' -n partial_chain ']' 967s + local verify_arg=--verify=partial_chain 967s + local output_base_name=SSSD-child-9042 967s + local output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.output 967s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.pem 967s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-sub-chain-CA.pem 967s Test Organization Sub Int Token 967s [p11_child[2539]] [main] (0x0400): p11_child started. 967s [p11_child[2539]] [main] (0x2000): Running in [pre-auth] mode. 967s [p11_child[2539]] [main] (0x2000): Running with effective IDs: [0][0]. 967s [p11_child[2539]] [main] (0x2000): Running with real IDs [0][0]. 967s [p11_child[2539]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 967s [p11_child[2539]] [do_card] (0x4000): Module List: 967s [p11_child[2539]] [do_card] (0x4000): common name: [softhsm2]. 967s [p11_child[2539]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2539]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 967s [p11_child[2539]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 967s [p11_child[2539]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2539]] [do_card] (0x4000): Login NOT required. 967s [p11_child[2539]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 967s [p11_child[2539]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 967s [p11_child[2539]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 967s [p11_child[2539]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 967s [p11_child[2539]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 967s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.output 967s + echo '-----BEGIN CERTIFICATE-----' 967s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.output 967s + echo '-----END CERTIFICATE-----' 967s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.pem 967s Certificate: 967s Data: 967s Version: 3 (0x2) 967s Serial Number: 5 (0x5) 967s Signature Algorithm: sha256WithRSAEncryption 967s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 967s Validity 967s Not Before: Mar 13 18:43:22 2024 GMT 967s Not After : Mar 13 18:43:22 2025 GMT 967s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 967s Subject Public Key Info: 967s Public Key Algorithm: rsaEncryption 967s Public-Key: (1024 bit) 967s Modulus: 967s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 967s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 967s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 967s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 967s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 967s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 967s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 967s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 967s 75:3d:06:43:04:fc:51:dd:41 967s Exponent: 65537 (0x10001) 967s X509v3 extensions: 967s X509v3 Authority Key Identifier: 967s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 967s X509v3 Basic Constraints: 967s CA:FALSE 967s Netscape Cert Type: 967s SSL Client, S/MIME 967s Netscape Comment: 967s Test Organization Sub Intermediate CA trusted Certificate 967s X509v3 Subject Key Identifier: 967s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 967s X509v3 Key Usage: critical 967s Digital Signature, Non Repudiation, Key Encipherment 967s X509v3 Extended Key Usage: 967s TLS Web Client Authentication, E-mail Protection 967s X509v3 Subject Alternative Name: 967s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 967s Signature Algorithm: sha256WithRSAEncryption 967s Signature Value: 967s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 967s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 967s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 967s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 967s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 967s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 967s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 967s a5:40 967s + local found_md5 expected_md5 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/test-sub-intermediate-CA-trusted-certificate-0001.pem 967s + expected_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042.pem 967s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 967s + output_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.output 967s ++ basename /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.output .output 967s + output_cert_file=/tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.pem 967s + echo -n 053350 967s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rYVL6z/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 967s [p11_child[2547]] [main] (0x0400): p11_child started. 967s [p11_child[2547]] [main] (0x2000): Running in [auth] mode. 967s [p11_child[2547]] [main] (0x2000): Running with effective IDs: [0][0]. 967s [p11_child[2547]] [main] (0x2000): Running with real IDs [0][0]. 967s [p11_child[2547]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 967s [p11_child[2547]] [do_card] (0x4000): Module List: 967s [p11_child[2547]] [do_card] (0x4000): common name: [softhsm2]. 967s [p11_child[2547]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2547]] [do_card] (0x4000): Description [SoftHSM slot ID 0x14b7f25d] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 967s [p11_child[2547]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 967s [p11_child[2547]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x14b7f25d][347599453] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 967s [p11_child[2547]] [do_card] (0x4000): Login required. 967s [p11_child[2547]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 967s [p11_child[2547]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 967s [p11_child[2547]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 967s [p11_child[2547]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x14b7f25d;slot-manufacturer=SoftHSM%20project;slot-id=347599453;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=377cf8c894b7f25d;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 967s [p11_child[2547]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 967s [p11_child[2547]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 967s [p11_child[2547]] [do_card] (0x4000): Certificate verified and validated. 967s [p11_child[2547]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 967s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.output 967s + echo '-----BEGIN CERTIFICATE-----' 967s + tail -n1 /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.output 967s + echo '-----END CERTIFICATE-----' 967s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.pem 967s Certificate: 967s Data: 967s Version: 3 (0x2) 967s Serial Number: 5 (0x5) 967s Signature Algorithm: sha256WithRSAEncryption 967s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 967s Validity 967s Not Before: Mar 13 18:43:22 2024 GMT 967s Not After : Mar 13 18:43:22 2025 GMT 967s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 967s Subject Public Key Info: 967s Public Key Algorithm: rsaEncryption 967s Public-Key: (1024 bit) 967s Modulus: 967s 00:ca:73:62:96:7b:9f:ea:c4:7f:1c:fb:57:ed:3f: 967s 9a:48:22:8f:71:99:2d:4a:1a:d4:20:e5:5f:01:06: 967s 4a:7f:07:5d:fb:98:01:ee:00:44:81:c8:69:86:23: 967s cb:70:10:29:39:da:69:da:43:b3:ff:89:af:d0:37: 967s 6d:11:c2:0b:53:7f:e3:24:a7:e8:b1:83:c8:3c:b9: 967s ed:25:13:23:e0:86:f2:37:83:09:49:2f:5b:c7:10: 967s a9:8f:88:f4:a0:f7:7f:ed:a7:bc:bb:09:c4:05:ec: 967s bc:83:8d:38:19:a1:da:20:bb:b2:ec:98:a7:2d:21: 967s 75:3d:06:43:04:fc:51:dd:41 967s Exponent: 65537 (0x10001) 967s X509v3 extensions: 967s X509v3 Authority Key Identifier: 967s 0B:20:B6:0E:09:F5:93:7B:8B:10:B3:C6:09:5F:E9:44:DC:52:F7:E9 967s X509v3 Basic Constraints: 967s CA:FALSE 967s Netscape Cert Type: 967s SSL Client, S/MIME 967s Netscape Comment: 967s Test Organization Sub Intermediate CA trusted Certificate 967s X509v3 Subject Key Identifier: 967s 51:EF:47:11:20:E1:9D:6E:EB:76:E1:94:AA:33:52:CE:EF:F6:A5:9C 967s X509v3 Key Usage: critical 967s Digital Signature, Non Repudiation, Key Encipherment 967s X509v3 Extended Key Usage: 967s TLS Web Client Authentication, E-mail Protection 967s X509v3 Subject Alternative Name: 967s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 967s Signature Algorithm: sha256WithRSAEncryption 967s Signature Value: 967s 6a:17:dd:8d:21:1e:ab:3e:f1:13:e9:c8:c8:eb:46:8b:12:1c: 967s 98:e0:97:8d:91:0c:67:fa:0c:50:a4:21:10:80:7a:7d:1f:66: 967s c7:c7:76:d9:37:32:86:e7:d7:f0:8f:de:d0:75:b5:7c:e5:80: 967s 76:b4:cc:ab:6f:94:e7:02:76:fc:2c:e4:5b:ca:df:08:8b:c6: 967s 0c:c5:16:cf:e9:d4:af:a9:49:b0:65:ec:8c:d2:c8:08:df:38: 967s 05:5a:29:e2:91:db:f7:23:75:d9:72:d9:27:c1:da:bd:f1:96: 967s df:c8:a5:19:e1:40:8b:f4:0d:88:2e:06:6a:b8:83:09:1c:47: 967s a5:40 967s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rYVL6z/SSSD-child-9042-auth.pem 967s 967s Test completed, Root CA and intermediate issued certificates verified! 967s + found_md5=Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 967s + '[' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 '!=' Modulus=CA7362967B9FEAC47F1CFB57ED3F9A48228F71992D4A1AD420E55F01064A7F075DFB9801EE004481C8698623CB70102939DA69DA43B3FF89AFD0376D11C20B537FE324A7E8B183C83CB9ED251323E086F2378309492F5BC710A98F88F4A0F77FEDA7BCBB09C405ECBC838D3819A1DA20BBB2EC98A72D21753D064304FC51DD41 ']' 967s + set +x 967s autopkgtest [18:43:26]: test sssd-softhism2-certificates-tests.sh: -----------------------] 968s autopkgtest [18:43:27]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 968s sssd-softhism2-certificates-tests.sh PASS 968s autopkgtest [18:43:27]: test sssd-smart-card-pam-auth-configs: preparing testbed 974s Reading package lists... 974s Building dependency tree... 974s Reading state information... 975s Starting pkgProblemResolver with broken count: 0 975s Starting 2 pkgProblemResolver with broken count: 0 975s Done 975s The following additional packages will be installed: 975s pamtester 975s The following NEW packages will be installed: 975s autopkgtest-satdep pamtester 975s 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. 975s Need to get 12.7 kB/13.5 kB of archives. 975s After this operation, 36.9 kB of additional disk space will be used. 975s Get:1 /tmp/autopkgtest.oAy9Sq/4-autopkgtest-satdep.deb autopkgtest-satdep amd64 0 [760 B] 975s Get:2 http://ftpmaster.internal/ubuntu noble/universe amd64 pamtester amd64 0.1.2-4 [12.7 kB] 975s Fetched 12.7 kB in 0s (404 kB/s) 975s Selecting previously unselected package pamtester. 975s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72445 files and directories currently installed.) 975s Preparing to unpack .../pamtester_0.1.2-4_amd64.deb ... 975s Unpacking pamtester (0.1.2-4) ... 976s Selecting previously unselected package autopkgtest-satdep. 976s Preparing to unpack .../4-autopkgtest-satdep.deb ... 976s Unpacking autopkgtest-satdep (0) ... 976s Setting up pamtester (0.1.2-4) ... 976s Setting up autopkgtest-satdep (0) ... 976s Processing triggers for man-db (2.12.0-3) ... 978s (Reading database ... 72451 files and directories currently installed.) 978s Removing autopkgtest-satdep (0) ... 978s autopkgtest [18:43:37]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 978s autopkgtest [18:43:37]: test sssd-smart-card-pam-auth-configs: [----------------------- 979s + '[' -z ubuntu ']' 979s + export DEBIAN_FRONTEND=noninteractive 979s + DEBIAN_FRONTEND=noninteractive 979s + required_tools=(pamtester softhsm2-util sssd) 979s + [[ ! -v OFFLINE_MODE ]] 979s + for cmd in "${required_tools[@]}" 979s + command -v pamtester 979s + for cmd in "${required_tools[@]}" 979s + command -v softhsm2-util 979s + for cmd in "${required_tools[@]}" 979s + command -v sssd 979s + PIN=123456 979s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 979s + tmpdir=/tmp/sssd-softhsm2-certs-1htUGS 979s + backupsdir= 979s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 979s + declare -a restore_paths 979s + declare -a delete_paths 979s + trap handle_exit EXIT 979s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 979s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 979s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 979s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 979s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-1htUGS GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 979s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-1htUGS 979s + GENERATE_SMART_CARDS=1 979s + KEEP_TEMPORARY_FILES=1 979s + NO_SSSD_TESTS=1 979s + bash debian/tests/sssd-softhism2-certificates-tests.sh 979s + '[' -z ubuntu ']' 979s + required_tools=(p11tool openssl softhsm2-util) 979s + for cmd in "${required_tools[@]}" 979s + command -v p11tool 979s + for cmd in "${required_tools[@]}" 979s + command -v openssl 979s + for cmd in "${required_tools[@]}" 979s + command -v softhsm2-util 979s + PIN=123456 979s +++ find /usr/lib/softhsm/libsofthsm2.so 979s +++ head -n 1 979s ++ realpath /usr/lib/softhsm/libsofthsm2.so 979s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 979s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 979s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 979s + '[' '!' -v NO_SSSD_TESTS ']' 979s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 979s + tmpdir=/tmp/sssd-softhsm2-certs-1htUGS 979s + keys_size=1024 979s + [[ ! -v KEEP_TEMPORARY_FILES ]] 979s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 979s + echo -n 01 979s + touch /tmp/sssd-softhsm2-certs-1htUGS/index.txt 979s + mkdir -p /tmp/sssd-softhsm2-certs-1htUGS/new_certs 979s + cat 979s + root_ca_key_pass=pass:random-root-CA-password-8372 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-key.pem -passout pass:random-root-CA-password-8372 1024 979s + openssl req -passin pass:random-root-CA-password-8372 -batch -config /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem 979s + cat 979s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-2878 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2878 1024 979s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-2878 -config /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-8372 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-certificate-request.pem 979s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-certificate-request.pem 979s Certificate Request: 979s Data: 979s Version: 1 (0x0) 979s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 979s Subject Public Key Info: 979s Public Key Algorithm: rsaEncryption 979s Public-Key: (1024 bit) 979s Modulus: 979s 00:e0:41:53:94:0b:26:c9:21:a1:47:80:39:e0:27: 979s d9:f4:e9:92:aa:6a:cc:d9:42:09:29:2a:8e:d8:60: 979s 34:1e:13:6e:ab:9e:88:b3:da:20:b3:a2:b5:e6:15: 979s 48:da:8c:97:6c:86:35:46:3f:75:4c:ee:a6:d6:26: 979s 04:8e:54:cf:7d:25:8d:82:dc:16:c5:38:d4:09:3e: 979s 44:f8:da:62:18:39:c1:d3:43:89:3c:80:d3:f4:11: 979s 00:78:ed:f9:7f:58:11:b8:c7:50:f9:64:87:9c:51: 979s 86:99:e5:ae:5a:32:db:79:da:91:7a:d8:b1:5d:bc: 979s 23:28:9d:2c:39:d8:44:0a:4f 979s Exponent: 65537 (0x10001) 979s Attributes: 979s (none) 979s Requested Extensions: 979s Signature Algorithm: sha256WithRSAEncryption 979s Signature Value: 979s 62:0a:f6:8d:42:09:08:ce:bd:2f:8d:5e:82:18:4b:92:46:c6: 979s e5:0e:4a:14:e7:cb:b9:78:de:c1:01:01:76:d7:8f:5a:d7:29: 979s b9:73:2b:a6:29:41:1c:4c:ce:80:f9:bb:12:3c:bd:90:4c:f9: 979s ce:f4:39:2d:16:dd:5b:e5:d5:57:86:ec:40:31:a6:9d:ba:ad: 979s ec:f7:fb:3a:e4:8a:17:62:ae:ae:5c:a4:f0:3d:c2:26:70:4c: 979s 8e:f2:26:2c:88:d6:5e:18:3c:89:c4:6b:4a:74:67:28:e8:21: 979s 9b:4c:1b:fa:0e:90:e8:34:26:1b:fd:50:78:4c:61:2a:b3:4c: 979s 98:60 979s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.config -passin pass:random-root-CA-password-8372 -keyfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem 979s Using configuration from /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.config 979s Check that the request matches the signature 979s Signature ok 979s Certificate Details: 979s Serial Number: 1 (0x1) 979s Validity 979s Not Before: Mar 13 18:43:38 2024 GMT 979s Not After : Mar 13 18:43:38 2025 GMT 979s Subject: 979s organizationName = Test Organization 979s organizationalUnitName = Test Organization Unit 979s commonName = Test Organization Intermediate CA 979s X509v3 extensions: 979s X509v3 Subject Key Identifier: 979s 7F:8B:1E:21:67:7B:2D:A1:60:30:71:32:8C:01:37:18:75:1D:A9:75 979s X509v3 Authority Key Identifier: 979s keyid:60:E8:C4:60:6A:78:DA:B0:BE:D2:C1:7C:2A:2E:E5:77:ED:EA:B0:1B 979s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 979s serial:00 979s X509v3 Basic Constraints: 979s CA:TRUE 979s X509v3 Key Usage: critical 979s Digital Signature, Certificate Sign, CRL Sign 979s Certificate is to be certified until Mar 13 18:43:38 2025 GMT (365 days) 979s 979s Write out database with 1 new entries 979s Database updated 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem: OK 979s + cat 979s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-24359 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-24359 1024 979s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-24359 -config /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-2878 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-certificate-request.pem 979s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-certificate-request.pem 979s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-2878 -keyfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s Using configuration from /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.config 979s Check that the request matches the signature 979s Signature ok 979s Certificate Details: 979s Serial Number: 2 (0x2) 979s Validity 979s Not Before: Mar 13 18:43:38 2024 GMT 979s Not After : Mar 13 18:43:38 2025 GMT 979s Subject: 979s organizationName = Test Organization 979s organizationalUnitName = Test Organization Unit 979s commonName = Test Organization Sub Intermediate CA 979s X509v3 extensions: 979s X509v3 Subject Key Identifier: 979s 94:41:79:F2:74:71:B3:83:DB:E9:2A:F0:0C:FF:D7:46:9A:CF:B5:AC 979s X509v3 Authority Key Identifier: 979s keyid:7F:8B:1E:21:67:7B:2D:A1:60:30:71:32:8C:01:37:18:75:1D:A9:75 979s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 979s serial:01 979s X509v3 Basic Constraints: 979s CA:TRUE 979s X509v3 Key Usage: critical 979s Digital Signature, Certificate Sign, CRL Sign 979s Certificate is to be certified until Mar 13 18:43:38 2025 GMT (365 days) 979s 979s Write out database with 1 new entries 979s Database updated 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s Certificate Request: 979s Data: 979s Version: 1 (0x0) 979s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 979s Subject Public Key Info: 979s Public Key Algorithm: rsaEncryption 979s Public-Key: (1024 bit) 979s Modulus: 979s 00:a9:88:12:3e:93:ab:3d:6e:bf:11:27:8d:72:62: 979s 14:80:a4:8e:08:eb:42:b2:6f:75:35:4c:f0:31:ca: 979s 82:02:5b:87:72:47:82:64:80:92:a9:a9:54:8c:1f: 979s 55:05:ca:d1:0d:73:02:77:69:41:c9:69:52:31:eb: 979s e3:f3:db:a7:9e:51:da:c7:c3:af:e3:97:0f:7c:9e: 979s 2e:09:c6:ab:63:0c:12:74:b4:90:b9:c6:76:da:a8: 979s cb:33:68:19:af:4d:b8:92:21:cf:40:28:4a:ef:a6: 979s d6:e3:cf:0b:14:92:c8:ac:85:7d:df:07:44:34:66: 979s ab:6f:8f:97:f8:43:f5:7b:99 979s Exponent: 65537 (0x10001) 979s Attributes: 979s (none) 979s Requested Extensions: 979s Signature Algorithm: sha256WithRSAEncryption 979s Signature Value: 979s 6e:3f:a4:ac:f3:01:c5:90:37:fe:8c:6e:e8:ad:40:4c:bb:d9: 979s f2:ea:84:ed:45:14:e7:b9:c2:39:3f:b7:7f:bb:c1:06:f2:e3: 979s 70:e6:2d:cb:f1:8d:b0:ff:5e:a1:8e:e1:b0:1b:12:af:2b:e9: 979s 4e:a2:58:b0:e1:c3:ab:1b:7c:9d:f3:52:b0:23:53:d5:64:9f: 979s 50:8f:e8:ad:f8:68:28:18:29:20:92:9d:4c:72:76:3b:e9:f1: 979s 6d:1b:64:92:28:0b:f3:18:7d:ce:29:43:2e:a0:ad:c9:79:a3: 979s 04:36:0d:c6:f6:45:49:fe:62:8b:76:d5:0c:4d:ae:69:12:f1: 979s 80:77 979s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem: OK 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 979s error 20 at 0 depth lookup: unable to get local issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem: verification failed 979s + cat 979s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-16059 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-16059 1024 979s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-16059 -key /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-request.pem 979s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-request.pem 979s Certificate Request: 979s Data: 979s Version: 1 (0x0) 979s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 979s Subject Public Key Info: 979s Public Key Algorithm: rsaEncryption 979s Public-Key: (1024 bit) 979s Modulus: 979s 00:bc:af:6d:1d:f1:84:7d:4d:31:52:b0:14:8f:12: 979s 43:a2:7a:00:ce:f0:3a:0f:cc:c0:cb:bd:2a:10:d0: 979s 44:f8:d4:76:e9:08:ee:d0:45:ba:f3:d8:c5:5c:cf: 979s 78:2f:d0:38:5a:b3:78:25:77:fa:81:4a:e8:fa:bd: 979s dd:98:a2:94:0e:2d:6c:6a:1e:1c:d8:c0:8c:3f:ba: 979s c0:3b:0a:9d:da:03:89:75:bd:90:75:03:42:e0:97: 979s 0d:b9:7e:2b:b4:90:fb:7d:b1:b4:79:e1:15:02:c4: 979s 10:f1:cd:7e:ba:54:e1:8c:8b:10:48:55:8a:88:c1: 979s ea:90:a5:ee:a3:27:35:e0:6d 979s Exponent: 65537 (0x10001) 979s Attributes: 979s Requested Extensions: 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Root CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s FE:2C:C1:50:17:FB:1F:7E:68:00:C7:F6:7D:95:70:2C:65:82:5F:93 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Signature Algorithm: sha256WithRSAEncryption 979s Signature Value: 979s 98:05:67:cb:1f:b4:85:77:8a:ff:39:eb:8c:36:bc:c7:f7:ff: 979s 0f:dd:90:30:e1:c6:3f:25:b1:45:c1:09:46:6d:ee:8d:e2:51: 979s 4d:fc:56:b3:e4:3f:b6:85:b8:05:ac:eb:ea:17:b9:d4:45:58: 979s 2e:d1:99:06:58:30:6d:23:e2:d8:ca:5a:1f:4c:3f:f4:a7:8f: 979s 5e:7f:43:b1:23:a6:8f:ea:b3:8b:58:d6:67:da:5f:6e:b6:8a: 979s 3e:24:79:38:ad:f3:ea:ac:b9:5b:b4:54:9c:2b:4e:d7:dd:80: 979s 59:02:b7:8b:f6:67:3f:01:90:b1:6c:08:cd:76:69:11:1e:5f: 979s a8:4a 979s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.config -passin pass:random-root-CA-password-8372 -keyfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s Using configuration from /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.config 979s Check that the request matches the signature 979s Signature ok 979s Certificate Details: 979s Serial Number: 3 (0x3) 979s Validity 979s Not Before: Mar 13 18:43:38 2024 GMT 979s Not After : Mar 13 18:43:38 2025 GMT 979s Subject: 979s organizationName = Test Organization 979s organizationalUnitName = Test Organization Unit 979s commonName = Test Organization Root Trusted Certificate 0001 979s X509v3 extensions: 979s X509v3 Authority Key Identifier: 979s 60:E8:C4:60:6A:78:DA:B0:BE:D2:C1:7C:2A:2E:E5:77:ED:EA:B0:1B 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Root CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s FE:2C:C1:50:17:FB:1F:7E:68:00:C7:F6:7D:95:70:2C:65:82:5F:93 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Certificate is to be certified until Mar 13 18:43:38 2025 GMT (365 days) 979s 979s Write out database with 1 new entries 979s Database updated 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem: OK 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 979s error 20 at 0 depth lookup: unable to get local issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem: verification failed 979s + cat 979s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-19754 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-19754 1024 979s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-19754 -key /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-request.pem 979s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-request.pem 979s Certificate Request: 979s Data: 979s Version: 1 (0x0) 979s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 979s Subject Public Key Info: 979s Public Key Algorithm: rsaEncryption 979s Public-Key: (1024 bit) 979s Modulus: 979s 00:9f:92:27:29:bd:ae:47:69:b6:d5:7d:2e:24:6b: 979s 61:e2:ba:6a:05:c2:27:f9:2c:ba:9e:a0:99:68:83: 979s 40:4f:8d:ef:f5:8b:89:7e:aa:64:22:36:e8:5a:61: 979s a4:01:16:18:cb:64:06:7e:bc:02:df:ff:92:8d:ea: 979s 89:03:3c:7c:fd:64:06:d5:78:43:23:22:a4:72:de: 979s b9:d8:b5:ab:ba:9a:b4:5e:79:e6:34:b6:ec:03:69: 979s 79:56:d9:7c:17:6e:f9:56:49:81:38:df:b3:25:7f: 979s ee:f7:a2:80:37:0e:75:11:e2:e4:13:7b:c8:c4:49: 979s c5:6b:e8:de:d9:b9:e8:f7:95 979s Exponent: 65537 (0x10001) 979s Attributes: 979s Requested Extensions: 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Intermediate CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s B0:04:14:FA:8C:DA:72:55:03:84:08:58:45:C9:B8:7C:F6:C2:A5:20 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Signature Algorithm: sha256WithRSAEncryption 979s Signature Value: 979s 43:16:2a:cd:fb:4c:db:4c:a4:aa:d6:e6:b9:e5:2c:12:c7:61: 979s af:94:80:2b:8c:1a:31:c8:a4:db:04:e2:ef:ce:51:bc:b2:6c: 979s e6:9d:c7:85:82:95:63:56:66:58:f4:ba:6b:f8:26:e8:da:0c: 979s 81:c8:55:90:35:d6:84:5a:bc:3a:c2:fb:a6:43:82:4b:09:a6: 979s c7:1d:e6:6d:19:cb:28:04:34:0f:94:b4:b7:ac:8c:c6:98:94: 979s 40:29:c8:4a:bc:78:00:47:49:1f:9e:ed:d4:72:53:20:f9:f7: 979s 71:08:59:f1:c1:74:5f:6c:41:da:a1:a7:64:4f:9e:79:0a:c3: 979s 73:d4 979s + openssl ca -passin pass:random-intermediate-CA-password-2878 -config /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s Using configuration from /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.config 979s Check that the request matches the signature 979s Signature ok 979s Certificate Details: 979s Serial Number: 4 (0x4) 979s Validity 979s Not Before: Mar 13 18:43:38 2024 GMT 979s Not After : Mar 13 18:43:38 2025 GMT 979s Subject: 979s organizationName = Test Organization 979s organizationalUnitName = Test Organization Unit 979s commonName = Test Organization Intermediate Trusted Certificate 0001 979s X509v3 extensions: 979s X509v3 Authority Key Identifier: 979s 7F:8B:1E:21:67:7B:2D:A1:60:30:71:32:8C:01:37:18:75:1D:A9:75 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Intermediate CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s B0:04:14:FA:8C:DA:72:55:03:84:08:58:45:C9:B8:7C:F6:C2:A5:20 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Certificate is to be certified until Mar 13 18:43:38 2025 GMT (365 days) 979s 979s Write out database with 1 new entries 979s Database updated 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s This certificate should not be trusted fully 979s + echo 'This certificate should not be trusted fully' 979s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 979s error 2 at 1 depth lookup: unable to get issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 979s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem: OK 979s + cat 979s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-32345 979s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-32345 1024 979s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-32345 -key /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 979s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 979s Certificate Request: 979s Data: 979s Version: 1 (0x0) 979s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 979s Subject Public Key Info: 979s Public Key Algorithm: rsaEncryption 979s Public-Key: (1024 bit) 979s Modulus: 979s 00:bb:da:5c:3a:81:41:8b:fb:3a:41:01:25:f8:21: 979s 2e:63:9e:9c:60:a1:a2:38:87:75:ce:6d:25:2e:9c: 979s ee:91:84:92:b8:2f:54:7f:09:dc:11:f3:a4:5f:b3: 979s 15:86:f1:59:22:30:6b:d1:41:d3:ed:cb:55:58:0f: 979s 8b:28:0c:c1:0c:06:6c:ec:84:4a:d7:3a:68:2e:72: 979s 50:22:63:d0:24:57:50:40:54:b7:41:90:8c:77:9a: 979s 67:fa:83:45:9e:35:65:6d:52:ff:84:37:1a:ab:be: 979s 08:d4:1c:18:2a:9b:25:53:79:fe:86:2c:06:66:fb: 979s 88:d1:26:d3:fe:72:1c:4a:03 979s Exponent: 65537 (0x10001) 979s Attributes: 979s Requested Extensions: 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Sub Intermediate CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s 0D:DE:25:26:2C:81:98:E3:EA:23:3F:BB:10:F0:5B:83:B7:7D:0A:23 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Signature Algorithm: sha256WithRSAEncryption 979s Signature Value: 979s 10:e2:c8:a0:31:ef:f7:bb:83:96:17:b5:6e:01:60:53:d2:01: 979s 58:70:f6:99:94:fc:d6:e3:87:d2:74:a1:c7:43:44:3d:66:df: 979s 14:1d:b7:0c:5f:20:53:fa:5e:c6:0d:df:39:e3:8c:1a:57:e5: 979s 63:2e:1f:a6:9b:79:f9:dd:61:12:ef:0d:42:57:2e:b4:46:21: 979s 7f:ac:20:d2:2f:c4:c6:a6:64:76:59:81:7c:75:ae:ce:20:46: 979s da:ba:4a:a3:db:1f:a1:3f:17:cb:bc:33:2e:ff:75:b5:b6:15: 979s 79:f4:cd:ff:c9:0f:08:ef:d3:25:68:1c:3e:3c:dc:c1:4e:4a: 979s 20:1f 979s + openssl ca -passin pass:random-sub-intermediate-CA-password-24359 -config /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s Using configuration from /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.config 979s Check that the request matches the signature 979s Signature ok 979s Certificate Details: 979s Serial Number: 5 (0x5) 979s Validity 979s Not Before: Mar 13 18:43:38 2024 GMT 979s Not After : Mar 13 18:43:38 2025 GMT 979s Subject: 979s organizationName = Test Organization 979s organizationalUnitName = Test Organization Unit 979s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 979s X509v3 extensions: 979s X509v3 Authority Key Identifier: 979s 94:41:79:F2:74:71:B3:83:DB:E9:2A:F0:0C:FF:D7:46:9A:CF:B5:AC 979s X509v3 Basic Constraints: 979s CA:FALSE 979s Netscape Cert Type: 979s SSL Client, S/MIME 979s Netscape Comment: 979s Test Organization Sub Intermediate CA trusted Certificate 979s X509v3 Subject Key Identifier: 979s 0D:DE:25:26:2C:81:98:E3:EA:23:3F:BB:10:F0:5B:83:B7:7D:0A:23 979s X509v3 Key Usage: critical 979s Digital Signature, Non Repudiation, Key Encipherment 979s X509v3 Extended Key Usage: 979s TLS Web Client Authentication, E-mail Protection 979s X509v3 Subject Alternative Name: 979s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 979s Certificate is to be certified until Mar 13 18:43:38 2025 GMT (365 days) 979s 979s Write out database with 1 new entries 979s Database updated 979s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s This certificate should not be trusted fully 979s + echo 'This certificate should not be trusted fully' 979s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 979s error 2 at 1 depth lookup: unable to get issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 979s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 979s error 20 at 0 depth lookup: unable to get local issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 979s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 979s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s + local cmd=openssl 979s + shift 979s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 979s error 20 at 0 depth lookup: unable to get local issuer certificate 979s error /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 979s + echo 'Building a the full-chain CA file...' 979s + cat /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s Building a the full-chain CA file... 979s + cat /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem 979s + cat /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 979s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem 979s + openssl pkcs7 -print_certs -noout 979s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 979s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 979s 979s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 979s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 979s 979s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 979s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 979s 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA.pem: OK 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem: OK 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-root-intermediate-chain-CA.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem: OK 979s /tmp/sssd-softhsm2-certs-1htUGS/test-root-intermediate-chain-CA.pem: OK 979s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 979s + echo 'Certificates generation completed!' 979s Certificates generation completed! 979s + [[ -v NO_SSSD_TESTS ]] 979s + [[ -v GENERATE_SMART_CARDS ]] 979s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16059 979s + local certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s + local key_pass=pass:random-root-ca-trusted-cert-0001-16059 979s + local key_cn 979s + local key_name 979s + local tokens_dir 979s + local output_cert_file 979s + token_name= 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem .pem 979s + key_name=test-root-CA-trusted-certificate-0001 979s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem 979s ++ sed -n 's/ *commonName *= //p' 979s + key_cn='Test Organization Root Trusted Certificate 0001' 979s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 979s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf 979s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 979s + tokens_dir=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001 979s + token_name='Test Organization Root Tr Token' 979s + '[' '!' -e /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 979s + local key_file 979s + local decrypted_key 979s + mkdir -p /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001 979s + key_file=/tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key.pem 979s + decrypted_key=/tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key-decrypted.pem 979s + cat 979s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 979s Slot 0 has a free/uninitialized token. 979s The token has been initialized and is reassigned to slot 938003225 979s + softhsm2-util --show-slots 979s Available slots: 979s Slot 938003225 979s Slot info: 979s Description: SoftHSM slot ID 0x37e8cb19 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 7424a52cb7e8cb19 979s Initialized: yes 979s User PIN init.: yes 979s Label: Test Organization Root Tr Token 979s Slot 1 979s Slot info: 979s Description: SoftHSM slot ID 0x1 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 979s Initialized: no 979s User PIN init.: no 979s Label: 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-16059 -in /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key-decrypted.pem 979s writing RSA key 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + rm /tmp/sssd-softhsm2-certs-1htUGS/test-root-CA-trusted-certificate-0001-key-decrypted.pem 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 979s Object 0: 979s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7424a52cb7e8cb19;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 979s Type: X.509 Certificate (RSA-1024) 979s Expires: Thu Mar 13 18:43:38 2025 979s Label: Test Organization Root Trusted Certificate 0001 979s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 979s 979s + echo 'Test Organization Root Tr Token' 979s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-19754 979s + local certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-19754 979s Test Organization Root Tr Token 979s + local key_cn 979s + local key_name 979s + local tokens_dir 979s + local output_cert_file 979s + token_name= 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem .pem 979s + key_name=test-intermediate-CA-trusted-certificate-0001 979s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem 979s ++ sed -n 's/ *commonName *= //p' 979s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 979s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 979s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 979s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 979s + tokens_dir=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001 979s + token_name='Test Organization Interme Token' 979s + '[' '!' -e /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 979s + local key_file 979s + local decrypted_key 979s + mkdir -p /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-intermediate-CA-trusted-certificate-0001 979s + key_file=/tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key.pem 979s + decrypted_key=/tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s + cat 979s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 979s Slot 0 has a free/uninitialized token. 979s The token has been initialized and is reassigned to slot 2043078106 979s + softhsm2-util --show-slots 979s Available slots: 979s Slot 2043078106 979s Slot info: 979s Description: SoftHSM slot ID 0x79c6e5da 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 091e95d879c6e5da 979s Initialized: yes 979s User PIN init.: yes 979s Label: Test Organization Interme Token 979s Slot 1 979s Slot info: 979s Description: SoftHSM slot ID 0x1 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 979s Initialized: no 979s User PIN init.: no 979s Label: 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-19754 -in /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s writing RSA key 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + rm /tmp/sssd-softhsm2-certs-1htUGS/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 979s Object 0: 979s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=091e95d879c6e5da;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 979s Type: X.509 Certificate (RSA-1024) 979s Expires: Thu Mar 13 18:43:38 2025 979s Label: Test Organization Intermediate Trusted Certificate 0001 979s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 979s 979s Test Organization Interme Token 979s + echo 'Test Organization Interme Token' 979s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-32345 979s + local certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-32345 979s + local key_cn 979s + local key_name 979s + local tokens_dir 979s + local output_cert_file 979s + token_name= 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 979s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 979s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem 979s ++ sed -n 's/ *commonName *= //p' 979s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 979s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 979s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 979s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 979s ++ basename /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 979s + tokens_dir=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 979s + token_name='Test Organization Sub Int Token' 979s + '[' '!' -e /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 979s + local key_file 979s + local decrypted_key 979s + mkdir -p /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 979s + key_file=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 979s + decrypted_key=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s + cat 979s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 979s Slot 0 has a free/uninitialized token. 979s The token has been initialized and is reassigned to slot 1048690553 979s + softhsm2-util --show-slots 979s Available slots: 979s Slot 1048690553 979s Slot info: 979s Description: SoftHSM slot ID 0x3e81bf79 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 27e929cd3e81bf79 979s Initialized: yes 979s User PIN init.: yes 979s Label: Test Organization Sub Int Token 979s Slot 1 979s Slot info: 979s Description: SoftHSM slot ID 0x1 979s Manufacturer ID: SoftHSM project 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Token present: yes 979s Token info: 979s Manufacturer ID: SoftHSM project 979s Model: SoftHSM v2 979s Hardware version: 2.6 979s Firmware version: 2.6 979s Serial number: 979s Initialized: no 979s User PIN init.: no 979s Label: 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-32345 -in /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s writing RSA key 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 979s + rm /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 979s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 979s Object 0: 979s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=27e929cd3e81bf79;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 979s Type: X.509 Certificate (RSA-1024) 979s Expires: Thu Mar 13 18:43:38 2025 979s Label: Test Organization Sub Intermediate Trusted Certificate 0001 979s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 979s 979s + echo 'Test Organization Sub Int Token' 979s + echo 'Certificates generation completed!' 979s + exit 0 979s + find /tmp/sssd-softhsm2-certs-1htUGS -type d -exec chmod 777 '{}' ';' 979s Test Organization Sub Int Token 979s Certificates generation completed! 979s + find /tmp/sssd-softhsm2-certs-1htUGS -type f -exec chmod 666 '{}' ';' 979s + backup_file /etc/sssd/sssd.conf 979s + '[' -z '' ']' 979s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 979s + backupsdir=/tmp/sssd-softhsm2-backups-gVs9te 979s + '[' -e /etc/sssd/sssd.conf ']' 979s + delete_paths+=("$1") 979s + rm -f /etc/sssd/sssd.conf 979s ++ runuser -u ubuntu -- sh -c 'echo ~' 979s + user_home=/home/ubuntu 979s + mkdir -p /home/ubuntu 979s + chown ubuntu:ubuntu /home/ubuntu 979s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 979s + user_config=/home/ubuntu/.config 979s + system_config=/etc 979s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 979s + for path_pair in "${softhsm2_conf_paths[@]}" 979s + IFS=: 979s + read -r -a path 979s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 979s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 979s + '[' -z /tmp/sssd-softhsm2-backups-gVs9te ']' 979s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 979s + delete_paths+=("$1") 979s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 979s + for path_pair in "${softhsm2_conf_paths[@]}" 979s + IFS=: 979s + read -r -a path 979s + path=/etc/softhsm/softhsm2.conf 979s + backup_file /etc/softhsm/softhsm2.conf 979s + '[' -z /tmp/sssd-softhsm2-backups-gVs9te ']' 979s + '[' -e /etc/softhsm/softhsm2.conf ']' 979s ++ dirname /etc/softhsm/softhsm2.conf 979s + local back_dir=/tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm 979s ++ basename /etc/softhsm/softhsm2.conf 979s + local back_path=/tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm/softhsm2.conf 979s + '[' '!' -e /tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm/softhsm2.conf ']' 979s + mkdir -p /tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm 979s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm/softhsm2.conf 979s + restore_paths+=("$back_path") 979s + rm -f /etc/softhsm/softhsm2.conf 980s + test_authentication login /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem 980s + pam_service=login 980s + certificate_config=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf 980s + ca_db=/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem 980s + verification_options= 980s + mkdir -p -m 700 /etc/sssd 980s Using CA DB '/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem' with verification options: '' 980s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 980s + cat 980s + chmod 600 /etc/sssd/sssd.conf 980s + for path_pair in "${softhsm2_conf_paths[@]}" 980s + IFS=: 980s + read -r -a path 980s + user=ubuntu 980s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 980s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 980s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 980s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 980s + runuser -u ubuntu -- softhsm2-util --show-slots 980s + grep 'Test Organization' 980s Label: Test Organization Root Tr Token 980s + for path_pair in "${softhsm2_conf_paths[@]}" 980s + IFS=: 980s + read -r -a path 980s + user=root 980s + path=/etc/softhsm/softhsm2.conf 980s ++ dirname /etc/softhsm/softhsm2.conf 980s + runuser -u root -- mkdir -p /etc/softhsm 980s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 980s + runuser -u root -- softhsm2-util --show-slots 980s + grep 'Test Organization' 980s Label: Test Organization Root Tr Token 980s + systemctl restart sssd 980s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 980s + for alternative in "${alternative_pam_configs[@]}" 980s + pam-auth-update --enable sss-smart-card-optional 980s + cat /etc/pam.d/common-auth 980s # 980s # /etc/pam.d/common-auth - authentication settings common to all services 980s # 980s # This file is included from other service-specific PAM config files, 980s # and should contain a list of the authentication modules that define 980s # the central authentication scheme for use on the system 980s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 980s # traditional Unix authentication mechanisms. 980s # 980s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 980s # To take advantage of this, it is recommended that you configure any 980s # local modules either before or after the default block, and use 980s # pam-auth-update to manage selection of other modules. See 980s # pam-auth-update(8) for details. 980s 980s # here are the per-package modules (the "Primary" block) 980s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 980s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 980s auth [success=1 default=ignore] pam_sss.so use_first_pass 980s # here's the fallback if no module succeeds 980s auth requisite pam_deny.so 980s # prime the stack with a positive return value if there isn't one already; 980s # this avoids us returning an error just because nothing sets a success code 980s # since the modules above will each just jump around 980s auth required pam_permit.so 980s # and here are more per-package modules (the "Additional" block) 980s auth optional pam_cap.so 980s # end of pam-auth-update config 980s + echo -n -e 123456 980s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 980s pamtester: invoking pam_start(login, ubuntu, ...) 980s pamtester: performing operation - authenticate 980s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 980s + echo -n -e 123456 980s + runuser -u ubuntu -- pamtester -v login '' authenticate 980s pamtester: invoking pam_start(login, , ...) 980s pamtester: performing operation - authenticate 980s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 980s + echo -n -e wrong123456 980s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 980s pamtester: invoking pam_start(login, ubuntu, ...) 980s pamtester: performing operation - authenticate 983s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 983s + echo -n -e wrong123456 983s + runuser -u ubuntu -- pamtester -v login '' authenticate 983s pamtester: invoking pam_start(login, , ...) 983s pamtester: performing operation - authenticate 986s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 986s + echo -n -e 123456 986s + pamtester -v login root authenticate 986s pamtester: invoking pam_start(login, root, ...) 986s pamtester: performing operation - authenticate 989s Password: pamtester: Authentication failure 989s + for alternative in "${alternative_pam_configs[@]}" 989s + pam-auth-update --enable sss-smart-card-required 989s PAM configuration 989s ----------------- 989s 989s Incompatible PAM profiles selected. 989s 989s The following PAM profiles cannot be used together: 989s 989s SSS required smart card authentication, SSS optional smart card 989s authentication 989s 989s Please select a different set of modules to enable. 989s 989s + cat /etc/pam.d/common-auth 989s # 989s # /etc/pam.d/common-auth - authentication settings common to all services 989s # 989s # This file is included from other service-specific PAM config files, 989s # and should contain a list of the authentication modules that define 989s # the central authentication scheme for use on the system 989s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 989s # traditional Unix authentication mechanisms. 989s # 989s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 989s # To take advantage of this, it is recommended that you configure any 989s # local modules either before or after the default block, and use 989s # pam-auth-update to manage selection of other modules. See 989s # pam-auth-update(8) for details. 989s 989s # here are the per-package modules (the "Primary" block) 989s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 989s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 989s auth [success=1 default=ignore] pam_sss.so use_first_pass 989s # here's the fallback if no module succeeds 989s auth requisite pam_deny.so 989s # prime the stack with a positive return value if there isn't one already; 989s # this avoids us returning an error just because nothing sets a success code 989s # since the modules above will each just jump around 989s auth required pam_permit.so 989s # and here are more per-package modules (the "Additional" block) 989s auth optional pam_cap.so 989s # end of pam-auth-update config 989s + echo -n -e 123456 989s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 989s pamtester: invoking pam_start(login, ubuntu, ...) 989s pamtester: performing operation - authenticate 989s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 989s + echo -n -e 123456 989s + runuser -u ubuntu -- pamtester -v login '' authenticate 989s pamtester: invoking pam_start(login, , ...) 989s pamtester: performing operation - authenticate 989s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 989s + echo -n -e wrong123456 989s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 989s pamtester: invoking pam_start(login, ubuntu, ...) 989s pamtester: performing operation - authenticate 992s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 992s + echo -n -e wrong123456 992s + runuser -u ubuntu -- pamtester -v login '' authenticate 992s pamtester: invoking pam_start(login, , ...) 992s pamtester: performing operation - authenticate 996s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 996s + echo -n -e 123456 996s + pamtester -v login root authenticate 996s pamtester: invoking pam_start(login, root, ...) 996s pamtester: performing operation - authenticate 998s pamtester: Authentication service cannot retrieve authentication info 998s + test_authentication login /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem 998s + pam_service=login 998s + certificate_config=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 998s + ca_db=/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem 998s + verification_options= 998s + mkdir -p -m 700 /etc/sssd 998s Using CA DB '/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem' with verification options: '' 998s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-1htUGS/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 998s + cat 998s + chmod 600 /etc/sssd/sssd.conf 998s + for path_pair in "${softhsm2_conf_paths[@]}" 998s + IFS=: 998s + read -r -a path 998s + user=ubuntu 998s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 998s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 998s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 998s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 998s + runuser -u ubuntu -- softhsm2-util --show-slots 998s + grep 'Test Organization' 998s Label: Test Organization Sub Int Token 998s + for path_pair in "${softhsm2_conf_paths[@]}" 998s + IFS=: 998s + read -r -a path 998s + user=root 998s + path=/etc/softhsm/softhsm2.conf 998s ++ dirname /etc/softhsm/softhsm2.conf 998s + runuser -u root -- mkdir -p /etc/softhsm 998s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 998s + runuser -u root -- softhsm2-util --show-slots 998s + grep 'Test Organization' 998s Label: Test Organization Sub Int Token 998s + systemctl restart sssd 1000s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1000s # 1000s # /etc/pam.d/common-auth - authentication settings common to all services 1000s # 1000s # This file is included from other service-specific PAM config files, 1000s # and should contain a list of the authentication modules that define 1000s # the central authentication scheme for use on the system 1000s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1000s # traditional Unix authentication mechanisms. 1000s # 1000s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1000s # To take advantage of this, it is recommended that you configure any 1000s # local modules either before or after the default block, and use 1000s # pam-auth-update to manage selection of other modules. See 1000s # pam-auth-update(8) for details. 1000s 1000s # here are the per-package modules (the "Primary" block) 1000s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1000s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1000s auth [success=1 default=ignore] pam_sss.so use_first_pass 1000s # here's the fallback if no module succeeds 1000s auth requisite pam_deny.so 1000s # prime the stack with a positive return value if there isn't one already; 1000s # this avoids us returning an error just because nothing sets a success code 1000s # since the modules above will each just jump around 1000s auth required pam_permit.so 1000s # and here are more per-package modules (the "Additional" block) 1000s auth optional pam_cap.so 1000s # end of pam-auth-update config 1000s + for alternative in "${alternative_pam_configs[@]}" 1000s + pam-auth-update --enable sss-smart-card-optional 1000s + cat /etc/pam.d/common-auth 1000s + echo -n -e 123456 1000s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1000s pamtester: invoking pam_start(login, ubuntu, ...) 1000s pamtester: performing operation - authenticate 1000s PIN for Test Organization Sub Int Token: + echo -n -e 123456 1000s + runuser -u ubuntu -- pamtester -v login '' authenticate 1000s pamtester: invoking pam_start(login, , ...) 1000s pamtester: performing operation - authenticate 1000s PIN for Test Organization Sub Int Token: + echo -n -e wrong123456 1000s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1000s pamtester: invoking pam_start(login, ubuntu, ...) 1000s pamtester: performing operation - authenticate 1000s PIN for Test Organization Sub Int Token: Password: pamtester: successfully authenticated 1000s pamtester: successfully authenticated 1002s pamtester: Authentication failure 1002s + echo -n -e wrong123456 1002s + runuser -u ubuntu -- pamtester -v login '' authenticate 1002s pamtester: invoking pam_start(login, , ...) 1002s pamtester: performing operation - authenticate 1005s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1005s + echo -n -e 123456 1005s + pamtester -v login root authenticate 1005s pamtester: invoking pam_start(login, root, ...) 1005s pamtester: performing operation - authenticate 1009s Password: pamtester: Authentication failure 1009s + for alternative in "${alternative_pam_configs[@]}" 1009s + pam-auth-update --enable sss-smart-card-required 1009s PAM configuration 1009s ----------------- 1009s 1009s Incompatible PAM profiles selected. 1009s 1009s The following PAM profiles cannot be used together: 1009s 1009s SSS required smart card authentication, SSS optional smart card 1009s authentication 1009s 1009s Please select a different set of modules to enable. 1009s 1009s + cat /etc/pam.d/common-auth 1009s # 1009s # /etc/pam.d/common-auth - authentication settings common to all services 1009s # 1009s # This file is included from other service-specific PAM config files, 1009s # and should contain a list of the authentication modules that define 1009s # the central authentication scheme for use on the system 1009s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1009s # traditional Unix authentication mechanisms. 1009s # 1009s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1009s # To take advantage of this, it is recommended that you configure any 1009s # local modules either before or after the default block, and use 1009s # pam-auth-update to manage selection of other modules. See 1009s # pam-auth-update(8) for details. 1009s 1009s # here are the per-package modules (the "Primary" block) 1009s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1009s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1009s auth [success=1 default=ignore] pam_sss.so use_first_pass 1009s # here's the fallback if no module succeeds 1009s auth requisite pam_deny.so 1009s # prime the stack with a positive return value if there isn't one already; 1009s # this avoids us returning an error just because nothing sets a success code 1009s # since the modules above will each just jump around 1009s auth required pam_permit.so 1009s # and here are more per-package modules (the "Additional" block) 1009s auth optional pam_cap.so 1009s # end of pam-auth-update config 1009s + echo -n -e 123456 1009s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1009s pamtester: invoking pam_start(login, ubuntu, ...) 1009s pamtester: performing operation - authenticate 1009s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1009s + echo -n -e 123456 1009s + runuser -u ubuntu -- pamtester -v login '' authenticate 1009s pamtester: invoking pam_start(login, , ...) 1009s pamtester: performing operation - authenticate 1009s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1009s + echo -n -e wrong123456 1009s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1009s pamtester: invoking pam_start(login, ubuntu, ...) 1009s pamtester: performing operation - authenticate 1011s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1011s + echo -n -e wrong123456 1011s + runuser -u ubuntu -- pamtester -v login '' authenticate 1011s pamtester: invoking pam_start(login, , ...) 1011s pamtester: performing operation - authenticate 1014s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1014s + echo -n -e 123456 1014s + pamtester -v login root authenticate 1014s pamtester: invoking pam_start(login, root, ...) 1014s pamtester: performing operation - authenticate 1018s pamtester: Authentication service cannot retrieve authentication info 1018s + test_authentication login /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem partial_chain 1018s + pam_service=login 1018s + certificate_config=/tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 1018s + ca_db=/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem 1018s + verification_options=partial_chain 1018s + mkdir -p -m 700 /etc/sssd 1018s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 1018s + cat 1018s Using CA DB '/tmp/sssd-softhsm2-certs-1htUGS/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 1018s + chmod 600 /etc/sssd/sssd.conf 1018s + for path_pair in "${softhsm2_conf_paths[@]}" 1018s + IFS=: 1018s + read -r -a path 1018s + user=ubuntu 1018s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 1018s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 1018s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 1018s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 1018s + runuser -u ubuntu -- softhsm2-util --show-slots 1018s + grep 'Test Organization' 1018s Label: Test Organization Sub Int Token 1018s + for path_pair in "${softhsm2_conf_paths[@]}" 1018s + IFS=: 1018s + read -r -a path 1018s + user=root 1018s + path=/etc/softhsm/softhsm2.conf 1018s ++ dirname /etc/softhsm/softhsm2.conf 1018s + runuser -u root -- mkdir -p /etc/softhsm 1018s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-1htUGS/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 1018s + runuser -u root -- softhsm2-util --show-slots 1018s + grep 'Test Organization' 1018s Label: Test Organization Sub Int Token 1018s + systemctl restart sssd 1018s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1018s + for alternative in "${alternative_pam_configs[@]}" 1018s + pam-auth-update --enable sss-smart-card-optional 1018s + cat /etc/pam.d/common-auth 1018s # 1018s # /etc/pam.d/common-auth - authentication settings common to all services 1018s # 1018s # This file is included from other service-specific PAM config files, 1018s # and should contain a list of the authentication modules that define 1018s # the central authentication scheme for use on the system 1018s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1018s # traditional Unix authentication mechanisms. 1018s # 1018s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1018s # To take advantage of this, it is recommended that you configure any 1018s # local modules either before or after the default block, and use 1018s # pam-auth-update to manage selection of other modules. See 1018s # pam-auth-update(8) for details. 1018s 1018s # here are the per-package modules (the "Primary" block) 1018s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 1018s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1018s auth [success=1 default=ignore] pam_sss.so use_first_pass 1018s # here's the fallback if no module succeeds 1018s auth requisite pam_deny.so 1018s # prime the stack with a positive return value if there isn't one already; 1018s # this avoids us returning an error just because nothing sets a success code 1018s # since the modules above will each just jump around 1018s auth required pam_permit.so 1018s # and here are more per-package modules (the "Additional" block) 1018s auth optional pam_cap.so 1018s # end of pam-auth-update config 1018s + echo -n -e 123456 1018s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1018s pamtester: invoking pam_start(login, ubuntu, ...) 1018s pamtester: performing operation - authenticate 1018s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1018s + echo -n -e 123456 1018s + runuser -u ubuntu -- pamtester -v login '' authenticate 1019s pamtester: invoking pam_start(login, , ...) 1019s pamtester: performing operation - authenticate 1019s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1019s + echo -n -e wrong123456 1019s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1019s pamtester: invoking pam_start(login, ubuntu, ...) 1019s pamtester: performing operation - authenticate 1021s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1021s + echo -n -e wrong123456 1021s + runuser -u ubuntu -- pamtester -v login '' authenticate 1021s pamtester: invoking pam_start(login, , ...) 1021s pamtester: performing operation - authenticate 1024s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 1024s + echo -n -e 123456 1024s + pamtester -v login root authenticate 1024s pamtester: invoking pam_start(login, root, ...) 1024s pamtester: performing operation - authenticate 1028s Password: pamtester: Authentication failure 1028s + for alternative in "${alternative_pam_configs[@]}" 1028s + pam-auth-update --enable sss-smart-card-required 1028s PAM configuration 1028s ----------------- 1028s 1028s Incompatible PAM profiles selected. 1028s 1028s The following PAM profiles cannot be used together: 1028s 1028s SSS required smart card authentication, SSS optional smart card 1028s authentication 1028s 1028s Please select a different set of modules to enable. 1028s 1028s + cat /etc/pam.d/common-auth 1028s # 1028s # /etc/pam.d/common-auth - authentication settings common to all services 1028s # 1028s # This file is included from other service-specific PAM config files, 1028s # and should contain a list of the authentication modules that define 1028s # the central authentication scheme for use on the system 1028s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 1028s # traditional Unix authentication mechanisms. 1028s # 1028s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 1028s # To take advantage of this, it is recommended that you configure any 1028s # local modules either before or after the default block, and use 1028s # pam-auth-update to manage selection of other modules. See 1028s # pam-auth-update(8) for details. 1028s 1028s # here are the per-package modules (the "Primary" block) 1028s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 1028s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 1028s auth [success=1 default=ignore] pam_sss.so use_first_pass 1028s # here's the fallback if no module succeeds 1028s auth requisite pam_deny.so 1028s # prime the stack with a positive return value if there isn't one already; 1028s # this avoids us returning an error just because nothing sets a success code 1028s # since the modules above will each just jump around 1028s auth required pam_permit.so 1028s # and here are more per-package modules (the "Additional" block) 1028s auth optional pam_cap.so 1028s # end of pam-auth-update config 1028s + echo -n -e 123456 1028s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1028s pamtester: invoking pam_start(login, ubuntu, ...) 1028s pamtester: performing operation - authenticate 1028s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1028s + echo -n -e 123456 1028s + runuser -u ubuntu -- pamtester -v login '' authenticate 1028s pamtester: invoking pam_start(login, , ...) 1028s pamtester: performing operation - authenticate 1028s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 1028s + echo -n -e wrong123456 1028s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 1028s pamtester: invoking pam_start(login, ubuntu, ...) 1028s pamtester: performing operation - authenticate 1031s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1031s + echo -n -e wrong123456 1031s + runuser -u ubuntu -- pamtester -v login '' authenticate 1031s pamtester: invoking pam_start(login, , ...) 1031s pamtester: performing operation - authenticate 1034s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 1034s + echo -n -e 123456 1034s + pamtester -v login root authenticate 1034s pamtester: invoking pam_start(login, root, ...) 1034s pamtester: performing operation - authenticate 1036s pamtester: Authentication service cannot retrieve authentication info 1036s + handle_exit 1036s + exit_code=0 1036s + restore_changes 1036s + for path in "${restore_paths[@]}" 1036s + local original_path 1036s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-gVs9te /tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm/softhsm2.conf 1036s + original_path=/etc/softhsm/softhsm2.conf 1036s + rm /etc/softhsm/softhsm2.conf 1036s + mv /tmp/sssd-softhsm2-backups-gVs9te//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 1036s + for path in "${delete_paths[@]}" 1036s + rm -f /etc/sssd/sssd.conf 1036s + for path in "${delete_paths[@]}" 1036s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 1036s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 1036s + '[' -e /etc/sssd/sssd.conf ']' 1036s + systemctl stop sssd 1036s + '[' -e /etc/softhsm/softhsm2.conf ']' 1036s + chmod 600 /etc/softhsm/softhsm2.conf 1036s + rm -rf /tmp/sssd-softhsm2-certs-1htUGS 1036s + '[' 0 = 0 ']' 1036s + rm -rf /tmp/sssd-softhsm2-backups-gVs9te 1036s + set +x 1036s Script completed successfully! 1037s autopkgtest [18:44:36]: test sssd-smart-card-pam-auth-configs: -----------------------] 1037s autopkgtest [18:44:36]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 1037s sssd-smart-card-pam-auth-configs PASS 1037s autopkgtest [18:44:36]: @@@@@@@@@@@@@@@@@@@@ summary 1037s ldap-user-group-ldap-auth PASS 1037s ldap-user-group-krb5-auth PASS 1037s sssd-softhism2-certificates-tests.sh PASS 1037s sssd-smart-card-pam-auth-configs PASS 1047s Creating nova instance adt-noble-amd64-sssd-20240313-182719-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-amd64-server-20240313.img (UUID 0e3f67bb-5842-4557-9141-15e62bea4fbf)... 1047s Creating nova instance adt-noble-amd64-sssd-20240313-182719-juju-7f2275-prod-proposed-migration-environment-3 from image adt/ubuntu-noble-amd64-server-20240313.img (UUID 0e3f67bb-5842-4557-9141-15e62bea4fbf)...