0s autopkgtest [13:35:15]: starting date: 2024-03-12 0s autopkgtest [13:35:15]: git checkout: d9c0295 adt_testbed.py: supress warnings from apt using a shell pipeline 0s autopkgtest [13:35:15]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.2kzstayc/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --setup-commands /home/ubuntu/autopkgtest/setup-commands/setup-testbed --apt-pocket=proposed=src:openldap,src:bind-dyndb-ldap,src:bind9,src:curl,src:cyrus-sasl2,src:db5.3,src:e2fsprogs,src:gdbm,src:gnutls28,src:heimdal,src:krb5,src:mmdebstrap,src:nettle,src:perl,src:python-ldap,src:sssd,src:sudo --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=openldap/2.6.7+dfsg-1~exp1ubuntu6 bind-dyndb-ldap/11.10-6ubuntu7 bind9/1:9.18.24-0ubuntu3 curl/8.5.0-2ubuntu6 cyrus-sasl2/2.1.28+dfsg1-4ubuntu4 db5.3/5.3.28+dfsg2-5 e2fsprogs/1.47.0-2.3ubuntu1 gdbm/1.23-5.1 gnutls28/3.8.3-1.1ubuntu2 heimdal/7.8.git20221117.28daf24+dfsg-5ubuntu1 krb5/1.20.1-5.1build2 mmdebstrap/1.4.3-6 nettle/3.9.1-2.2 perl/5.38.2-3.2 python-ldap/3.4.4-1 sssd/2.9.4-1.1ubuntu1 sudo/1.9.15p5-3ubuntu2' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-arm64-10.secgroup --name adt-noble-arm64-sssd-20240312-133515-juju-7f2275-prod-proposed-migration-environment-2 --image adt/ubuntu-noble-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 75s autopkgtest [13:36:30]: @@@@@@@@@@@@@@@@@@@@ test bed setup 75s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 75s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2783 kB] 76s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [449 kB] 76s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [4812 B] 76s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [40.9 kB] 76s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 Packages [601 kB] 76s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 c-n-f Metadata [3144 B] 76s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 Packages [20.3 kB] 76s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 c-n-f Metadata [116 B] 76s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 Packages [3225 kB] 76s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 c-n-f Metadata [8528 B] 76s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 Packages [52.3 kB] 76s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 c-n-f Metadata [116 B] 77s Fetched 7306 kB in 1s (5047 kB/s) 77s Reading package lists... 81s Reading package lists... 81s Building dependency tree... 81s Reading state information... 82s Calculating upgrade... 82s The following packages were automatically installed and are no longer required: 82s libgdbm-compat4t64 libperl5.38 lto-disabled-list make perl-modules-5.38 82s Use 'sudo apt autoremove' to remove them. 82s The following packages will be REMOVED: 82s dpkg-dev libcom-err2 libdpkg-perl libext2fs2 libgdbm-compat4 libgdbm6 82s libgnutls30 libhogweed6 libnettle8 libpsl5 libss2 libssl3 libuv1 perl 82s The following NEW packages will be installed: 82s libcom-err2t64 libext2fs2t64 libgdbm-compat4t64 libgdbm6t64 libgnutls30t64 82s libhogweed6t64 libnettle8t64 libpsl5t64 libss2t64 libssl3t64 libuv1t64 82s The following packages have been kept back: 82s libperl5.38 libsasl2-2 libsasl2-modules-db 82s The following packages will be upgraded: 82s bind9-dnsutils bind9-host bind9-libs curl e2fsprogs e2fsprogs-l10n 82s firmware-sof-signed krb5-locales libcurl3-gnutls libcurl4 libgssapi-krb5-2 82s libk5crypto3 libkrb5-3 libkrb5support0 libldap-common libldap2 82s libsasl2-modules logsave perl-base perl-modules-5.38 sudo 82s 21 upgraded, 11 newly installed, 14 to remove and 3 not upgraded. 82s Need to get 17.2 MB of archives. 82s After this operation, 3395 kB disk space will be freed. 82s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl-base arm64 5.38.2-3.2 [1777 kB] 83s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libss2t64 arm64 1.47.0-2.3ubuntu1 [16.6 kB] 83s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcom-err2t64 arm64 1.47.0-2.3ubuntu1 [22.2 kB] 83s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 logsave arm64 1.47.0-2.3ubuntu1 [21.9 kB] 83s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 e2fsprogs-l10n all 1.47.0-2.3ubuntu1 [5994 B] 83s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libext2fs2t64 arm64 1.47.0-2.3ubuntu1 [214 kB] 83s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 e2fsprogs arm64 1.47.0-2.3ubuntu1 [592 kB] 83s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgdbm6t64 arm64 1.23-5.1 [34.3 kB] 83s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgdbm-compat4t64 arm64 1.23-5.1 [6576 B] 83s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sudo arm64 1.9.15p5-3ubuntu2 [928 kB] 83s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-modules arm64 2.1.28+dfsg1-4ubuntu4 [69.5 kB] 83s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libk5crypto3 arm64 1.20.1-5.1build2 [85.6 kB] 83s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgssapi-krb5-2 arm64 1.20.1-5.1build2 [141 kB] 83s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkrb5support0 arm64 1.20.1-5.1build2 [33.8 kB] 83s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkrb5-3 arm64 1.20.1-5.1build2 [349 kB] 83s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libuv1t64 arm64 1.48.0-1.1 [95.3 kB] 83s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-host arm64 1:9.18.24-0ubuntu3 [50.2 kB] 83s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-dnsutils arm64 1:9.18.24-0ubuntu3 [155 kB] 83s Get:19 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-libs arm64 1:9.18.24-0ubuntu3 [1197 kB] 83s Get:20 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libssl3t64 arm64 3.0.13-0ubuntu1 [1770 kB] 83s Get:21 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 curl arm64 8.5.0-2ubuntu6 [222 kB] 83s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcurl4 arm64 8.5.0-2ubuntu6 [332 kB] 83s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libpsl5t64 arm64 0.21.2-1.1 [57.4 kB] 83s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcurl3-gnutls arm64 8.5.0-2ubuntu6 [327 kB] 83s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnettle8t64 arm64 3.9.1-2.2 [192 kB] 83s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libhogweed6t64 arm64 3.9.1-2.2 [199 kB] 83s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgnutls30t64 arm64 3.8.3-1.1ubuntu2 [1042 kB] 83s Get:28 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl-modules-5.38 all 5.38.2-3.2 [3110 kB] 83s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 krb5-locales all 1.20.1-5.1build2 [13.8 kB] 83s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldap2 arm64 2.6.7+dfsg-1~exp1ubuntu6 [193 kB] 83s Get:31 http://ftpmaster.internal/ubuntu noble/main arm64 firmware-sof-signed all 2023.12.1-1ubuntu1 [3906 kB] 83s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldap-common all 2.6.7+dfsg-1~exp1ubuntu6 [31.3 kB] 84s Fetched 17.2 MB in 1s (13.8 MB/s) 84s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74748 files and directories currently installed.) 84s Removing dpkg-dev (1.22.4ubuntu5) ... 84s Removing libdpkg-perl (1.22.4ubuntu5) ... 84s Removing perl (5.38.2-3) ... 84s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 84s Preparing to unpack .../perl-base_5.38.2-3.2_arm64.deb ... 84s Unpacking perl-base (5.38.2-3.2) over (5.38.2-3) ... 85s Setting up perl-base (5.38.2-3.2) ... 85s dpkg: libss2:arm64: dependency problems, but removing anyway as you requested: 85s e2fsprogs depends on libss2 (>= 1.38). 85s 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 85s Removing libss2:arm64 (1.47.0-2ubuntu1) ... 85s Selecting previously unselected package libss2t64:arm64. 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 85s Preparing to unpack .../libss2t64_1.47.0-2.3ubuntu1_arm64.deb ... 85s Unpacking libss2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s dpkg: libcom-err2:arm64: dependency problems, but removing anyway as you requested: 85s openssh-server depends on libcom-err2 (>= 1.43.9). 85s libreiserfscore0 depends on libcom-err2 (>= 1.43.9). 85s libkrb5-3:arm64 depends on libcom-err2 (>= 1.43.9). 85s libgssapi-krb5-2:arm64 depends on libcom-err2 (>= 1.43.9). 85s inetutils-telnet depends on libcom-err2 (>= 1.43.9). 85s e2fsprogs depends on libcom-err2 (>= 1.43.9). 85s btrfs-progs depends on libcom-err2 (>= 1.43.9). 85s 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74168 files and directories currently installed.) 85s Removing libcom-err2:arm64 (1.47.0-2ubuntu1) ... 85s Selecting previously unselected package libcom-err2t64:arm64. 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74163 files and directories currently installed.) 85s Preparing to unpack .../libcom-err2t64_1.47.0-2.3ubuntu1_arm64.deb ... 85s Unpacking libcom-err2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s Preparing to unpack .../logsave_1.47.0-2.3ubuntu1_arm64.deb ... 85s Unpacking logsave (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 85s Preparing to unpack .../e2fsprogs-l10n_1.47.0-2.3ubuntu1_all.deb ... 85s Unpacking e2fsprogs-l10n (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 85s dpkg: libext2fs2:arm64: dependency problems, but removing anyway as you requested: 85s libblockdev-fs3:arm64 depends on libext2fs2 (>= 1.42.11). 85s e2fsprogs depends on libext2fs2 (= 1.47.0-2ubuntu1). 85s btrfs-progs depends on libext2fs2 (>= 1.42). 85s 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 85s Removing libext2fs2:arm64 (1.47.0-2ubuntu1) ... 85s Selecting previously unselected package libext2fs2t64:arm64. 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 85s Preparing to unpack .../libext2fs2t64_1.47.0-2.3ubuntu1_arm64.deb ... 85s Unpacking libext2fs2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s Setting up libcom-err2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s Setting up libext2fs2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s Setting up libss2t64:arm64 (1.47.0-2.3ubuntu1) ... 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 85s Preparing to unpack .../e2fsprogs_1.47.0-2.3ubuntu1_arm64.deb ... 85s Unpacking e2fsprogs (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 85s dpkg: libgdbm6:arm64: dependency problems, but removing anyway as you requested: 85s python3-gdbm:arm64 depends on libgdbm6 (>= 1.16). 85s man-db depends on libgdbm6 (>= 1.16). 85s libperl5.38:arm64 depends on libgdbm6 (>= 1.21). 85s libgdbm-compat4:arm64 depends on libgdbm6 (>= 1.16). 85s 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 85s Removing libgdbm6:arm64 (1.23-5) ... 85s Selecting previously unselected package libgdbm6t64:arm64. 85s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74165 files and directories currently installed.) 85s Preparing to unpack .../libgdbm6t64_1.23-5.1_arm64.deb ... 85s Unpacking libgdbm6t64:arm64 (1.23-5.1) ... 86s dpkg: libgdbm-compat4:arm64: dependency problems, but removing anyway as you requested: 86s libperl5.38:arm64 depends on libgdbm-compat4 (>= 1.18-3). 86s 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74171 files and directories currently installed.) 86s Removing libgdbm-compat4:arm64 (1.23-5) ... 86s Selecting previously unselected package libgdbm-compat4t64:arm64. 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74166 files and directories currently installed.) 86s Preparing to unpack .../0-libgdbm-compat4t64_1.23-5.1_arm64.deb ... 86s Unpacking libgdbm-compat4t64:arm64 (1.23-5.1) ... 86s Preparing to unpack .../1-sudo_1.9.15p5-3ubuntu2_arm64.deb ... 86s Unpacking sudo (1.9.15p5-3ubuntu2) over (1.9.15p5-3ubuntu1) ... 86s Preparing to unpack .../2-libsasl2-modules_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 86s Unpacking libsasl2-modules:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 86s Preparing to unpack .../3-libk5crypto3_1.20.1-5.1build2_arm64.deb ... 86s Unpacking libk5crypto3:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 86s Preparing to unpack .../4-libgssapi-krb5-2_1.20.1-5.1build2_arm64.deb ... 86s Unpacking libgssapi-krb5-2:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 86s Preparing to unpack .../5-libkrb5support0_1.20.1-5.1build2_arm64.deb ... 86s Unpacking libkrb5support0:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 86s Preparing to unpack .../6-libkrb5-3_1.20.1-5.1build2_arm64.deb ... 86s Unpacking libkrb5-3:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 86s dpkg: libuv1:arm64: dependency problems, but removing anyway as you requested: 86s bind9-libs:arm64 depends on libuv1 (>= 1.40.0). 86s 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74172 files and directories currently installed.) 86s Removing libuv1:arm64 (1.48.0-1) ... 86s Selecting previously unselected package libuv1t64:arm64. 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 86s Preparing to unpack .../libuv1t64_1.48.0-1.1_arm64.deb ... 86s Unpacking libuv1t64:arm64 (1.48.0-1.1) ... 86s Preparing to unpack .../bind9-host_1%3a9.18.24-0ubuntu3_arm64.deb ... 86s Unpacking bind9-host (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 86s Preparing to unpack .../bind9-dnsutils_1%3a9.18.24-0ubuntu3_arm64.deb ... 86s Unpacking bind9-dnsutils (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 86s Preparing to unpack .../bind9-libs_1%3a9.18.24-0ubuntu3_arm64.deb ... 86s Unpacking bind9-libs:arm64 (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 86s dpkg: libssl3:arm64: dependency problems, but removing anyway as you requested: 86s wget depends on libssl3 (>= 3.0.0). 86s u-boot-tools depends on libssl3 (>= 3.0.0). 86s tnftp depends on libssl3 (>= 3.0.0). 86s tcpdump depends on libssl3 (>= 3.0.0). 86s systemd-resolved depends on libssl3 (>= 3.0.0). 86s systemd depends on libssl3 (>= 3.0.0). 86s sbsigntool depends on libssl3 (>= 3.0.0). 86s rsync depends on libssl3 (>= 3.0.0). 86s python3-cryptography depends on libssl3 (>= 3.0.0). 86s openssl depends on libssl3 (>= 3.0.9). 86s openssh-server depends on libssl3 (>= 3.0.10). 86s openssh-client depends on libssl3 (>= 3.0.10). 86s mtd-utils depends on libssl3 (>= 3.0.0). 86s mokutil depends on libssl3 (>= 3.0.0). 86s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 86s libsystemd-shared:arm64 depends on libssl3 (>= 3.0.0). 86s libssh-4:arm64 depends on libssl3 (>= 3.0.0). 86s libsasl2-2:arm64 depends on libssl3 (>= 3.0.0). 86s libpython3.12-minimal:arm64 depends on libssl3 (>= 3.0.0). 86s libnvme1 depends on libssl3 (>= 3.0.0). 86s libkmod2:arm64 depends on libssl3 (>= 3.0.0). 86s libfido2-1:arm64 depends on libssl3 (>= 3.0.0). 86s libcurl4:arm64 depends on libssl3 (>= 3.0.0). 86s libcryptsetup12:arm64 depends on libssl3 (>= 3.0.0). 86s kmod depends on libssl3 (>= 3.0.0). 86s dhcpcd-base depends on libssl3 (>= 3.0.0). 86s 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74173 files and directories currently installed.) 86s Removing libssl3:arm64 (3.0.10-1ubuntu4) ... 86s Selecting previously unselected package libssl3t64:arm64. 86s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 86s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu1_arm64.deb ... 86s Unpacking libssl3t64:arm64 (3.0.13-0ubuntu1) ... 86s Preparing to unpack .../curl_8.5.0-2ubuntu6_arm64.deb ... 86s Unpacking curl (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 86s Preparing to unpack .../libcurl4_8.5.0-2ubuntu6_arm64.deb ... 86s Unpacking libcurl4:arm64 (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 86s dpkg: libpsl5:arm64: dependency problems, but removing anyway as you requested: 86s wget depends on libpsl5 (>= 0.16.0). 86s libcurl3-gnutls:arm64 depends on libpsl5 (>= 0.16.0). 86s 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74175 files and directories currently installed.) 87s Removing libpsl5:arm64 (0.21.2-1build1) ... 87s Selecting previously unselected package libpsl5t64:arm64. 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 87s Preparing to unpack .../libpsl5t64_0.21.2-1.1_arm64.deb ... 87s Unpacking libpsl5t64:arm64 (0.21.2-1.1) ... 87s Preparing to unpack .../libcurl3-gnutls_8.5.0-2ubuntu6_arm64.deb ... 87s Unpacking libcurl3-gnutls:arm64 (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 87s dpkg: libnettle8:arm64: dependency problems, but removing anyway as you requested: 87s librtmp1:arm64 depends on libnettle8. 87s libhogweed6:arm64 depends on libnettle8. 87s libgnutls30:arm64 depends on libnettle8 (>= 3.9~). 87s libarchive13:arm64 depends on libnettle8. 87s 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74176 files and directories currently installed.) 87s Removing libnettle8:arm64 (3.9.1-2) ... 87s Selecting previously unselected package libnettle8t64:arm64. 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 87s Preparing to unpack .../libnettle8t64_3.9.1-2.2_arm64.deb ... 87s Unpacking libnettle8t64:arm64 (3.9.1-2.2) ... 87s dpkg: libhogweed6:arm64: dependency problems, but removing anyway as you requested: 87s librtmp1:arm64 depends on libhogweed6. 87s libjcat1:arm64 depends on libhogweed6. 87s libgnutls30:arm64 depends on libhogweed6 (>= 3.6). 87s 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74177 files and directories currently installed.) 87s Removing libhogweed6:arm64 (3.9.1-2) ... 87s Selecting previously unselected package libhogweed6t64:arm64. 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74172 files and directories currently installed.) 87s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_arm64.deb ... 87s Unpacking libhogweed6t64:arm64 (3.9.1-2.2) ... 87s dpkg: libgnutls30:arm64: dependency problems, but removing anyway as you requested: 87s u-boot-tools depends on libgnutls30 (>= 3.7.3). 87s librtmp1:arm64 depends on libgnutls30 (>= 3.7.2). 87s libldap2:arm64 depends on libgnutls30 (>= 3.8.2). 87s libjcat1:arm64 depends on libgnutls30 (>= 3.7.3). 87s fwupd depends on libgnutls30 (>= 3.7.3). 87s dirmngr depends on libgnutls30 (>= 3.8.1). 87s apt depends on libgnutls30 (>= 3.8.1). 87s 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74178 files and directories currently installed.) 87s Removing libgnutls30:arm64 (3.8.3-1ubuntu1) ... 87s Selecting previously unselected package libgnutls30t64:arm64. 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 87s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_arm64.deb ... 87s Unpacking libgnutls30t64:arm64 (3.8.3-1.1ubuntu2) ... 87s Setting up libnettle8t64:arm64 (3.9.1-2.2) ... 87s Setting up libhogweed6t64:arm64 (3.9.1-2.2) ... 87s Setting up libgnutls30t64:arm64 (3.8.3-1.1ubuntu2) ... 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74197 files and directories currently installed.) 87s Preparing to unpack .../perl-modules-5.38_5.38.2-3.2_all.deb ... 87s Unpacking perl-modules-5.38 (5.38.2-3.2) over (5.38.2-3) ... 88s Preparing to unpack .../krb5-locales_1.20.1-5.1build2_all.deb ... 88s Unpacking krb5-locales (1.20.1-5.1build2) over (1.20.1-5build1) ... 88s Preparing to unpack .../libldap2_2.6.7+dfsg-1~exp1ubuntu6_arm64.deb ... 88s Unpacking libldap2:arm64 (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 88s Preparing to unpack .../firmware-sof-signed_2023.12.1-1ubuntu1_all.deb ... 88s Unpacking firmware-sof-signed (2023.12.1-1ubuntu1) over (2.2.6-1ubuntu4) ... 88s Preparing to unpack .../libldap-common_2.6.7+dfsg-1~exp1ubuntu6_all.deb ... 88s Unpacking libldap-common (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 88s Setting up libgdbm6t64:arm64 (1.23-5.1) ... 88s Setting up libgdbm-compat4t64:arm64 (1.23-5.1) ... 88s Setting up libssl3t64:arm64 (3.0.13-0ubuntu1) ... 88s Setting up firmware-sof-signed (2023.12.1-1ubuntu1) ... 88s Setting up libsasl2-modules:arm64 (2.1.28+dfsg1-4ubuntu4) ... 88s Setting up libuv1t64:arm64 (1.48.0-1.1) ... 88s Setting up libpsl5t64:arm64 (0.21.2-1.1) ... 88s Setting up krb5-locales (1.20.1-5.1build2) ... 88s Setting up libldap-common (2.6.7+dfsg-1~exp1ubuntu6) ... 88s Setting up libkrb5support0:arm64 (1.20.1-5.1build2) ... 88s Setting up perl-modules-5.38 (5.38.2-3.2) ... 88s Setting up sudo (1.9.15p5-3ubuntu2) ... 88s Setting up libk5crypto3:arm64 (1.20.1-5.1build2) ... 88s Setting up logsave (1.47.0-2.3ubuntu1) ... 88s Setting up libkrb5-3:arm64 (1.20.1-5.1build2) ... 88s Setting up libldap2:arm64 (2.6.7+dfsg-1~exp1ubuntu6) ... 88s Setting up e2fsprogs (1.47.0-2.3ubuntu1) ... 88s update-initramfs: deferring update (trigger activated) 89s e2scrub_all.service is a disabled or a static unit not running, not starting it. 89s Setting up libgssapi-krb5-2:arm64 (1.20.1-5.1build2) ... 89s Setting up libcurl4:arm64 (8.5.0-2ubuntu6) ... 89s Setting up curl (8.5.0-2ubuntu6) ... 89s Setting up bind9-libs:arm64 (1:9.18.24-0ubuntu3) ... 89s Setting up e2fsprogs-l10n (1.47.0-2.3ubuntu1) ... 89s Setting up libcurl3-gnutls:arm64 (8.5.0-2ubuntu6) ... 89s Setting up bind9-host (1:9.18.24-0ubuntu3) ... 89s Setting up bind9-dnsutils (1:9.18.24-0ubuntu3) ... 89s Processing triggers for man-db (2.12.0-3) ... 91s Processing triggers for libc-bin (2.39-0ubuntu2) ... 91s Processing triggers for initramfs-tools (0.142ubuntu20) ... 91s update-initramfs: Generating /boot/initrd.img-6.8.0-11-generic 91s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 112s System running in EFI mode, skipping. 112s Reading package lists... 112s Building dependency tree... 112s Reading state information... 113s The following packages will be REMOVED: 113s libgdbm-compat4t64* libperl5.38* lto-disabled-list* make* perl-modules-5.38* 114s 0 upgraded, 0 newly installed, 5 to remove and 2 not upgraded. 114s After this operation, 52.0 MB disk space will be freed. 114s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74208 files and directories currently installed.) 114s Removing libperl5.38:arm64 (5.38.2-3) ... 114s Removing libgdbm-compat4t64:arm64 (1.23-5.1) ... 114s Removing lto-disabled-list (47) ... 114s Removing make (4.3-4.1build1) ... 114s Removing perl-modules-5.38 (5.38.2-3.2) ... 114s Processing triggers for man-db (2.12.0-3) ... 114s Processing triggers for libc-bin (2.39-0ubuntu2) ... 117s sh: Attempting to set up Debian/Ubuntu apt sources automatically 117s sh: Distribution appears to be Ubuntu 118s Reading package lists... 118s Building dependency tree... 118s Reading state information... 119s eatmydata is already the newest version (131-1). 119s dbus is already the newest version (1.14.10-4ubuntu1). 119s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 119s Reading package lists... 119s Building dependency tree... 119s Reading state information... 119s rng-tools-debian is already the newest version (2.4). 119s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 119s Reading package lists... 120s Building dependency tree... 120s Reading state information... 120s haveged is already the newest version (1.9.14-1ubuntu1). 120s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 120s Reading package lists... 120s Building dependency tree... 120s Reading state information... 121s The following additional packages will be installed: 121s libdb5.3t64 libdpkg-perl libgdbm-compat4t64 libperl5.38t64 lto-disabled-list 121s make perl perl-modules-5.38 121s Suggested packages: 121s debian-keyring gcc | c-compiler git bzr make-doc perl-doc 121s libterm-readline-gnu-perl | libterm-readline-perl-perl 121s libtap-harness-archive-perl 121s Recommended packages: 121s build-essential gcc | c-compiler fakeroot libalgorithm-merge-perl 121s libfile-fcntllock-perl 121s The following packages will be REMOVED: 121s libdb5.3 121s The following NEW packages will be installed: 121s dpkg-dev libdb5.3t64 libdpkg-perl libgdbm-compat4t64 libperl5.38t64 121s lto-disabled-list make perl perl-modules-5.38 121s 0 upgraded, 9 newly installed, 1 to remove and 2 not upgraded. 121s Need to get 7257 kB/10.4 MB of archives. 121s After this operation, 56.1 MB of additional disk space will be used. 121s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libdb5.3t64 arm64 5.3.28+dfsg2-5 [719 kB] 122s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libperl5.38t64 arm64 5.38.2-3.2 [4771 kB] 122s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl arm64 5.38.2-3.2 [231 kB] 122s Get:4 http://ftpmaster.internal/ubuntu noble/main arm64 libdpkg-perl all 1.22.4ubuntu5 [268 kB] 122s Get:5 http://ftpmaster.internal/ubuntu noble/main arm64 make arm64 4.3-4.1build1 [177 kB] 122s Get:6 http://ftpmaster.internal/ubuntu noble/main arm64 lto-disabled-list all 47 [12.4 kB] 122s Get:7 http://ftpmaster.internal/ubuntu noble/main arm64 dpkg-dev all 1.22.4ubuntu5 [1078 kB] 122s Fetched 7257 kB in 1s (9164 kB/s) 122s dpkg: libdb5.3:arm64: dependency problems, but removing anyway as you requested: 122s libsasl2-modules-db:arm64 depends on libdb5.3. 122s libpython3.12-stdlib:arm64 depends on libdb5.3. 122s libpam-modules:arm64 depends on libdb5.3. 122s iproute2 depends on libdb5.3. 122s apt-utils depends on libdb5.3. 122s 123s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72237 files and directories currently installed.) 123s Removing libdb5.3:arm64 (5.3.28+dfsg2-4) ... 123s Selecting previously unselected package libdb5.3t64:arm64. 123s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72231 files and directories currently installed.) 123s Preparing to unpack .../libdb5.3t64_5.3.28+dfsg2-5_arm64.deb ... 123s Unpacking libdb5.3t64:arm64 (5.3.28+dfsg2-5) ... 123s Setting up libdb5.3t64:arm64 (5.3.28+dfsg2-5) ... 123s Selecting previously unselected package perl-modules-5.38. 123s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72237 files and directories currently installed.) 123s Preparing to unpack .../0-perl-modules-5.38_5.38.2-3.2_all.deb ... 123s Unpacking perl-modules-5.38 (5.38.2-3.2) ... 124s Selecting previously unselected package libgdbm-compat4t64:arm64. 124s Preparing to unpack .../1-libgdbm-compat4t64_1.23-5.1_arm64.deb ... 124s Unpacking libgdbm-compat4t64:arm64 (1.23-5.1) ... 124s Selecting previously unselected package libperl5.38t64:arm64. 124s Preparing to unpack .../2-libperl5.38t64_5.38.2-3.2_arm64.deb ... 124s Unpacking libperl5.38t64:arm64 (5.38.2-3.2) ... 124s Selecting previously unselected package perl. 124s Preparing to unpack .../3-perl_5.38.2-3.2_arm64.deb ... 124s Unpacking perl (5.38.2-3.2) ... 124s Selecting previously unselected package libdpkg-perl. 124s Preparing to unpack .../4-libdpkg-perl_1.22.4ubuntu5_all.deb ... 124s Unpacking libdpkg-perl (1.22.4ubuntu5) ... 124s Selecting previously unselected package make. 124s Preparing to unpack .../5-make_4.3-4.1build1_arm64.deb ... 124s Unpacking make (4.3-4.1build1) ... 124s Selecting previously unselected package lto-disabled-list. 124s Preparing to unpack .../6-lto-disabled-list_47_all.deb ... 124s Unpacking lto-disabled-list (47) ... 124s Selecting previously unselected package dpkg-dev. 124s Preparing to unpack .../7-dpkg-dev_1.22.4ubuntu5_all.deb ... 124s Unpacking dpkg-dev (1.22.4ubuntu5) ... 125s Setting up lto-disabled-list (47) ... 125s Setting up libgdbm-compat4t64:arm64 (1.23-5.1) ... 125s Setting up make (4.3-4.1build1) ... 125s Setting up perl-modules-5.38 (5.38.2-3.2) ... 125s Setting up libperl5.38t64:arm64 (5.38.2-3.2) ... 125s Setting up perl (5.38.2-3.2) ... 125s Setting up libdpkg-perl (1.22.4ubuntu5) ... 125s Setting up dpkg-dev (1.22.4ubuntu5) ... 125s Processing triggers for man-db (2.12.0-3) ... 126s Processing triggers for libc-bin (2.39-0ubuntu2) ... 126s Reading package lists... 127s Building dependency tree... 127s Reading state information... 127s The following packages will be REMOVED: 127s cloud-init* python3-configobj* python3-debconf* 127s 0 upgraded, 0 newly installed, 3 to remove and 2 not upgraded. 127s After this operation, 3248 kB disk space will be freed. 127s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74789 files and directories currently installed.) 127s Removing cloud-init (24.1-0ubuntu1) ... 128s Removing python3-configobj (5.0.8-3) ... 128s Removing python3-debconf (1.5.86) ... 128s Processing triggers for man-db (2.12.0-3) ... 129s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74400 files and directories currently installed.) 129s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 129s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 129s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 130s Reading package lists... 130s Building dependency tree... 130s Reading state information... 130s linux-generic is already the newest version (6.8.0-11.11+1). 130s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 131s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 131s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 131s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 131s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 132s Reading package lists... 132s Reading package lists... 132s Building dependency tree... 132s Reading state information... 133s Calculating upgrade... 133s The following packages will be upgraded: 133s libsasl2-2 libsasl2-modules-db 133s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 133s Need to get 76.1 kB of archives. 133s After this operation, 0 B of additional disk space will be used. 133s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-modules-db arm64 2.1.28+dfsg1-4ubuntu4 [21.5 kB] 133s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-2 arm64 2.1.28+dfsg1-4ubuntu4 [54.7 kB] 134s Fetched 76.1 kB in 0s (229 kB/s) 134s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 134s Preparing to unpack .../libsasl2-modules-db_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 134s Unpacking libsasl2-modules-db:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 134s Preparing to unpack .../libsasl2-2_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 134s Unpacking libsasl2-2:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 134s Setting up libsasl2-modules-db:arm64 (2.1.28+dfsg1-4ubuntu4) ... 134s Setting up libsasl2-2:arm64 (2.1.28+dfsg1-4ubuntu4) ... 134s Processing triggers for man-db (2.12.0-3) ... 134s Processing triggers for libc-bin (2.39-0ubuntu2) ... 134s Reading package lists... 135s Building dependency tree... 135s Reading state information... 135s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 135s autopkgtest [13:37:30]: rebooting testbed after setup commands that affected boot 335s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 341s autopkgtest [13:40:56]: testbed running kernel: Linux 6.8.0-11-generic #11-Ubuntu SMP PREEMPT_DYNAMIC Wed Feb 14 02:53:31 UTC 2024 341s autopkgtest [13:40:56]: testbed dpkg architecture: arm64 342s autopkgtest [13:40:57]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 353s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu1 (dsc) [5282 B] 353s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu1 (tar) [7983 kB] 353s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu1 (asc) [833 B] 353s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main sssd 2.9.4-1.1ubuntu1 (diff) [48.6 kB] 353s gpgv: Signature made Fri Mar 8 16:25:37 2024 UTC 353s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 353s gpgv: Can't check signature: No public key 353s dpkg-source: warning: cannot verify inline signature for ./sssd_2.9.4-1.1ubuntu1.dsc: no acceptable signature found 354s autopkgtest [13:41:09]: testing package sssd version 2.9.4-1.1ubuntu1 354s autopkgtest [13:41:09]: build not needed 356s autopkgtest [13:41:11]: test ldap-user-group-ldap-auth: preparing testbed 362s Reading package lists... 362s Building dependency tree... 362s Reading state information... 362s Correcting dependencies...Starting pkgProblemResolver with broken count: 1 362s Starting 2 pkgProblemResolver with broken count: 1 362s Investigating (0) autopkgtest-satdep:arm64 < 0 @iU K Nb Ib > 362s Broken autopkgtest-satdep:arm64 Depends on sssd:arm64 < none @un H > 362s Considering sssd:arm64 2 as a solution to autopkgtest-satdep:arm64 -2 362s Removing autopkgtest-satdep:arm64 rather than change sssd:arm64 362s Done 363s Done 363s Starting pkgProblemResolver with broken count: 0 363s Starting 2 pkgProblemResolver with broken count: 0 363s Done 364s The following packages will be REMOVED: 364s autopkgtest-satdep 364s 0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. 364s 1 not fully installed or removed. 364s After this operation, 0 B of additional disk space will be used. 364s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 364s Removing autopkgtest-satdep (0) ... 365s autopkgtest: WARNING: package sssd is not installed though it should be 365s autopkgtest: WARNING: package sssd-common is not installed though it should be 366s autopkgtest: WARNING: package sssd-ad is not installed though it should be 366s autopkgtest: WARNING: package sssd-ad-common is not installed though it should be 367s autopkgtest: WARNING: package sssd-dbus is not installed though it should be 367s autopkgtest: WARNING: package sssd-idp is not installed though it should be 367s autopkgtest: WARNING: package sssd-ipa is not installed though it should be 368s autopkgtest: WARNING: package sssd-kcm is not installed though it should be 368s autopkgtest: WARNING: package sssd-krb5 is not installed though it should be 368s autopkgtest: WARNING: package sssd-krb5-common is not installed though it should be 369s autopkgtest: WARNING: package sssd-ldap is not installed though it should be 369s autopkgtest: WARNING: package sssd-passkey is not installed though it should be 370s autopkgtest: WARNING: package sssd-proxy is not installed though it should be 370s autopkgtest: WARNING: package sssd-tools is not installed though it should be 370s autopkgtest: WARNING: package libnss-sss is not installed though it should be 371s autopkgtest: WARNING: package libpam-sss is not installed though it should be 371s autopkgtest: WARNING: package libipa-hbac0t64 is not installed though it should be 371s autopkgtest: WARNING: package libipa-hbac-dev is not installed though it should be 372s autopkgtest: WARNING: package libsss-certmap0 is not installed though it should be 372s autopkgtest: WARNING: package libsss-certmap-dev is not installed though it should be 372s autopkgtest: WARNING: package libsss-idmap0 is not installed though it should be 373s autopkgtest: WARNING: package libsss-idmap-dev is not installed though it should be 373s autopkgtest: WARNING: package libsss-nss-idmap0 is not installed though it should be 374s autopkgtest: WARNING: package libsss-nss-idmap-dev is not installed though it should be 374s autopkgtest: WARNING: package libsss-sudo is not installed though it should be 374s autopkgtest: WARNING: package python3-libipa-hbac is not installed though it should be 375s autopkgtest: WARNING: package python3-libsss-nss-idmap is not installed though it should be 375s autopkgtest: WARNING: package python3-sss is not installed though it should be 375s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from noble-proposed 376s Reading package lists... 377s Building dependency tree... 377s Reading state information... 377s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 377s Starting 2 pkgProblemResolver with broken count: 0 377s Done 377s Done 378s Starting pkgProblemResolver with broken count: 0 378s Starting 2 pkgProblemResolver with broken count: 0 378s Done 378s The following additional packages will be installed: 378s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 378s libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 libdhash1t64 378s libevent-2.1-7 libini-config5t64 libipa-hbac-dev libipa-hbac0t64 libjose0 378s libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 378s libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 378s libpwquality1 libref-array1t64 libsmbclient0 libsss-certmap-dev 378s libsss-certmap0 libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev 378s libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0t64 378s libtirpc-common libtirpc3t64 libverto-libevent1 libverto1 libwbclient0 378s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 378s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 378s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 378s tcl-expect tcl8.6 378s Suggested packages: 378s tk8.6 libsasl2-modules-gssapi-mit | libsasl2-modules-gssapi-heimdal 378s odbc-postgresql tdsodbc adcli libsasl2-modules-ldap tcl-tclreadline 378s Recommended packages: 378s cracklib-runtime libsasl2-modules-gssapi-mit 378s | libsasl2-modules-gssapi-heimdal 379s The following packages will be REMOVED: 379s libtirpc3 379s The following NEW packages will be installed: 379s expect ldap-utils libavahi-client3 libavahi-common-data libavahi-common3 379s libbasicobjects0t64 libc-ares2 libcollection4t64 libcrack2 libdhash1t64 379s libevent-2.1-7 libini-config5t64 libipa-hbac-dev libipa-hbac0t64 libjose0 379s libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss libnss-sudo libodbc2 379s libpam-pwquality libpam-sss libpath-utils1t64 libpwquality-common 379s libpwquality1 libref-array1t64 libsmbclient0 libsss-certmap-dev 379s libsss-certmap0 libsss-idmap-dev libsss-idmap0 libsss-nss-idmap-dev 379s libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 libtdb1 libtevent0t64 379s libtirpc3t64 libverto-libevent1 libverto1 libwbclient0 python3-libipa-hbac 379s python3-libsss-nss-idmap python3-sss samba-libs slapd sssd sssd-ad 379s sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm sssd-krb5 379s sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools tcl-expect 379s tcl8.6 379s The following packages will be upgraded: 379s libtirpc-common 379s 1 upgraded, 65 newly installed, 1 to remove and 189 not upgraded. 379s 1 not fully installed or removed. 379s Need to get 12.7 MB of archives. 379s After this operation, 60.1 MB of additional disk space will be used. 379s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtalloc2 arm64 2.4.2-1build1 [26.7 kB] 379s Get:2 http://ftpmaster.internal/ubuntu noble/main arm64 libtdb1 arm64 1.4.10-1 [48.4 kB] 379s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtevent0t64 arm64 0.16.1-2 [42.2 kB] 379s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldb2 arm64 2:2.8.0+samba4.19.5+dfsg-4ubuntu2 [188 kB] 379s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 python3-sss arm64 2.9.4-1.1ubuntu1 [46.6 kB] 379s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-idmap0 arm64 2.9.4-1.1ubuntu1 [22.0 kB] 379s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnss-sss arm64 2.9.4-1.1ubuntu1 [31.8 kB] 379s Get:8 http://ftpmaster.internal/ubuntu noble/main arm64 libcrack2 arm64 2.9.6-5.1 [28.7 kB] 379s Get:9 http://ftpmaster.internal/ubuntu noble/main arm64 libpwquality-common all 1.4.5-3 [7658 B] 379s Get:10 http://ftpmaster.internal/ubuntu noble/main arm64 libpwquality1 arm64 1.4.5-3 [13.2 kB] 379s Get:11 http://ftpmaster.internal/ubuntu noble/main arm64 libpam-pwquality arm64 1.4.5-3 [11.6 kB] 379s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libpam-sss arm64 2.9.4-1.1ubuntu1 [48.9 kB] 379s Get:13 http://ftpmaster.internal/ubuntu noble/main arm64 libc-ares2 arm64 1.27.0-1 [74.1 kB] 379s Get:14 http://ftpmaster.internal/ubuntu noble/main arm64 libdhash1t64 arm64 0.6.2-2.1 [8854 B] 379s Get:15 http://ftpmaster.internal/ubuntu noble/main arm64 libbasicobjects0t64 arm64 0.6.2-2.1 [5868 B] 379s Get:16 http://ftpmaster.internal/ubuntu noble/main arm64 libcollection4t64 arm64 0.6.2-2.1 [23.5 kB] 379s Get:17 http://ftpmaster.internal/ubuntu noble/main arm64 libpath-utils1t64 arm64 0.6.2-2.1 [9090 B] 379s Get:18 http://ftpmaster.internal/ubuntu noble/main arm64 libref-array1t64 arm64 0.6.2-2.1 [7348 B] 379s Get:19 http://ftpmaster.internal/ubuntu noble/main arm64 libini-config5t64 arm64 0.6.2-2.1 [44.6 kB] 379s Get:20 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnfsidmap1 arm64 1:2.6.4-3ubuntu3 [48.1 kB] 379s Get:21 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-certmap0 arm64 2.9.4-1.1ubuntu1 [45.9 kB] 379s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-nss-idmap0 arm64 2.9.4-1.1ubuntu1 [30.4 kB] 379s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-common arm64 2.9.4-1.1ubuntu1 [1147 kB] 379s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-common-data arm64 0.8-13ubuntu4 [29.5 kB] 379s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-common3 arm64 0.8-13ubuntu4 [23.3 kB] 379s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-client3 arm64 0.8-13ubuntu4 [27.2 kB] 379s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtirpc-common all 1.3.4+ds-1.1 [8018 B] 379s Get:28 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtirpc3t64 arm64 1.3.4+ds-1.1 [83.5 kB] 379s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libwbclient0 arm64 2:4.19.5+dfsg-4ubuntu2 [71.2 kB] 379s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 samba-libs arm64 2:4.19.5+dfsg-4ubuntu2 [6061 kB] 379s Get:31 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ad-common arm64 2.9.4-1.1ubuntu1 [75.4 kB] 379s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-krb5-common arm64 2.9.4-1.1ubuntu1 [87.9 kB] 379s Get:33 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsmbclient0 arm64 2:4.19.5+dfsg-4ubuntu2 [62.1 kB] 379s Get:34 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ad arm64 2.9.4-1.1ubuntu1 [134 kB] 379s Get:35 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libipa-hbac0t64 arm64 2.9.4-1.1ubuntu1 [16.8 kB] 379s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ipa arm64 2.9.4-1.1ubuntu1 [220 kB] 379s Get:37 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-krb5 arm64 2.9.4-1.1ubuntu1 [14.3 kB] 379s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ldap arm64 2.9.4-1.1ubuntu1 [31.3 kB] 379s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-proxy arm64 2.9.4-1.1ubuntu1 [44.6 kB] 380s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd arm64 2.9.4-1.1ubuntu1 [4120 B] 380s Get:41 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-dbus arm64 2.9.4-1.1ubuntu1 [103 kB] 380s Get:42 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 libjose0 arm64 11-3build1 [44.3 kB] 380s Get:43 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libevent-2.1-7 arm64 2.1.12-stable-9build1 [140 kB] 380s Get:44 http://ftpmaster.internal/ubuntu noble/main arm64 libverto-libevent1 arm64 0.3.1-1ubuntu5 [5848 B] 380s Get:45 http://ftpmaster.internal/ubuntu noble/main arm64 libverto1 arm64 0.3.1-1ubuntu5 [10.2 kB] 380s Get:46 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkrad0 arm64 1.20.1-5.1build2 [22.1 kB] 380s Get:47 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 sssd-idp arm64 2.9.4-1.1ubuntu1 [27.9 kB] 380s Get:48 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 sssd-kcm arm64 2.9.4-1.1ubuntu1 [139 kB] 380s Get:49 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 sssd-passkey arm64 2.9.4-1.1ubuntu1 [32.7 kB] 380s Get:50 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-tools arm64 2.9.4-1.1ubuntu1 [97.5 kB] 380s Get:51 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libipa-hbac-dev arm64 2.9.4-1.1ubuntu1 [6668 B] 380s Get:52 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-certmap-dev arm64 2.9.4-1.1ubuntu1 [5734 B] 380s Get:53 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-idmap-dev arm64 2.9.4-1.1ubuntu1 [8380 B] 380s Get:54 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-nss-idmap-dev arm64 2.9.4-1.1ubuntu1 [6708 B] 380s Get:55 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 libnss-sudo all 1.9.15p5-3ubuntu2 [15.0 kB] 380s Get:56 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 libsss-sudo arm64 2.9.4-1.1ubuntu1 [20.5 kB] 380s Get:57 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 python3-libipa-hbac arm64 2.9.4-1.1ubuntu1 [16.6 kB] 380s Get:58 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 python3-libsss-nss-idmap arm64 2.9.4-1.1ubuntu1 [9148 B] 380s Get:59 http://ftpmaster.internal/ubuntu noble/main arm64 libltdl7 arm64 2.4.7-7 [40.3 kB] 380s Get:60 http://ftpmaster.internal/ubuntu noble/main arm64 libodbc2 arm64 2.3.12-1 [144 kB] 380s Get:61 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 slapd arm64 2.6.7+dfsg-1~exp1ubuntu6 [1515 kB] 380s Get:62 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 ldap-utils arm64 2.6.7+dfsg-1~exp1ubuntu6 [148 kB] 380s Get:63 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtcl8.6 arm64 8.6.14+dfsg-1 [978 kB] 380s Get:64 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 tcl8.6 arm64 8.6.14+dfsg-1 [14.6 kB] 380s Get:65 http://ftpmaster.internal/ubuntu noble/universe arm64 tcl-expect arm64 5.45.4-2build1 [103 kB] 380s Get:66 http://ftpmaster.internal/ubuntu noble/universe arm64 expect arm64 5.45.4-2build1 [137 kB] 380s Preconfiguring packages ... 380s Fetched 12.7 MB in 1s (10.6 MB/s) 380s Selecting previously unselected package libtalloc2:arm64. 380s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 380s Preparing to unpack .../00-libtalloc2_2.4.2-1build1_arm64.deb ... 380s Unpacking libtalloc2:arm64 (2.4.2-1build1) ... 380s Selecting previously unselected package libtdb1:arm64. 380s Preparing to unpack .../01-libtdb1_1.4.10-1_arm64.deb ... 380s Unpacking libtdb1:arm64 (1.4.10-1) ... 381s Selecting previously unselected package libtevent0t64:arm64. 381s Preparing to unpack .../02-libtevent0t64_0.16.1-2_arm64.deb ... 381s Unpacking libtevent0t64:arm64 (0.16.1-2) ... 381s Selecting previously unselected package libldb2:arm64. 381s Preparing to unpack .../03-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu2_arm64.deb ... 381s Unpacking libldb2:arm64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 381s Selecting previously unselected package python3-sss. 381s Preparing to unpack .../04-python3-sss_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking python3-sss (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libsss-idmap0. 381s Preparing to unpack .../05-libsss-idmap0_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libnss-sss:arm64. 381s Preparing to unpack .../06-libnss-sss_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking libnss-sss:arm64 (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libcrack2:arm64. 381s Preparing to unpack .../07-libcrack2_2.9.6-5.1_arm64.deb ... 381s Unpacking libcrack2:arm64 (2.9.6-5.1) ... 381s Selecting previously unselected package libpwquality-common. 381s Preparing to unpack .../08-libpwquality-common_1.4.5-3_all.deb ... 381s Unpacking libpwquality-common (1.4.5-3) ... 381s Selecting previously unselected package libpwquality1:arm64. 381s Preparing to unpack .../09-libpwquality1_1.4.5-3_arm64.deb ... 381s Unpacking libpwquality1:arm64 (1.4.5-3) ... 381s Selecting previously unselected package libpam-pwquality:arm64. 381s Preparing to unpack .../10-libpam-pwquality_1.4.5-3_arm64.deb ... 381s Unpacking libpam-pwquality:arm64 (1.4.5-3) ... 381s Selecting previously unselected package libpam-sss:arm64. 381s Preparing to unpack .../11-libpam-sss_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking libpam-sss:arm64 (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libc-ares2:arm64. 381s Preparing to unpack .../12-libc-ares2_1.27.0-1_arm64.deb ... 381s Unpacking libc-ares2:arm64 (1.27.0-1) ... 381s Selecting previously unselected package libdhash1t64:arm64. 381s Preparing to unpack .../13-libdhash1t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libdhash1t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libbasicobjects0t64:arm64. 381s Preparing to unpack .../14-libbasicobjects0t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libbasicobjects0t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libcollection4t64:arm64. 381s Preparing to unpack .../15-libcollection4t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libcollection4t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libpath-utils1t64:arm64. 381s Preparing to unpack .../16-libpath-utils1t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libpath-utils1t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libref-array1t64:arm64. 381s Preparing to unpack .../17-libref-array1t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libref-array1t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libini-config5t64:arm64. 381s Preparing to unpack .../18-libini-config5t64_0.6.2-2.1_arm64.deb ... 381s Unpacking libini-config5t64:arm64 (0.6.2-2.1) ... 381s Selecting previously unselected package libnfsidmap1:arm64. 381s Preparing to unpack .../19-libnfsidmap1_1%3a2.6.4-3ubuntu3_arm64.deb ... 381s Unpacking libnfsidmap1:arm64 (1:2.6.4-3ubuntu3) ... 381s Selecting previously unselected package libsss-certmap0. 381s Preparing to unpack .../20-libsss-certmap0_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libsss-nss-idmap0. 381s Preparing to unpack .../21-libsss-nss-idmap0_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package sssd-common. 381s Preparing to unpack .../22-sssd-common_2.9.4-1.1ubuntu1_arm64.deb ... 381s Unpacking sssd-common (2.9.4-1.1ubuntu1) ... 381s Selecting previously unselected package libavahi-common-data:arm64. 381s Preparing to unpack .../23-libavahi-common-data_0.8-13ubuntu4_arm64.deb ... 381s Unpacking libavahi-common-data:arm64 (0.8-13ubuntu4) ... 381s Selecting previously unselected package libavahi-common3:arm64. 381s Preparing to unpack .../24-libavahi-common3_0.8-13ubuntu4_arm64.deb ... 381s Unpacking libavahi-common3:arm64 (0.8-13ubuntu4) ... 381s Selecting previously unselected package libavahi-client3:arm64. 381s Preparing to unpack .../25-libavahi-client3_0.8-13ubuntu4_arm64.deb ... 381s Unpacking libavahi-client3:arm64 (0.8-13ubuntu4) ... 382s Preparing to unpack .../26-libtirpc-common_1.3.4+ds-1.1_all.deb ... 382s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 382s dpkg: libtirpc3:arm64: dependency problems, but removing anyway as you requested: 382s lsof depends on libtirpc3 (>= 1.0.2). 382s libpython3.12-stdlib:arm64 depends on libtirpc3 (>= 1.0.2). 382s libnss-nisplus:arm64 depends on libtirpc3 (>= 1.0.2). 382s libnsl2:arm64 depends on libtirpc3 (>= 1.0.2). 382s iproute2 depends on libtirpc3 (>= 1.0.2). 382s 382s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74644 files and directories currently installed.) 382s Removing libtirpc3:arm64 (1.3.4+ds-1build1) ... 382s Selecting previously unselected package libtirpc3t64:arm64. 382s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74638 files and directories currently installed.) 382s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_arm64.deb ... 382s Adding 'diversion of /lib/aarch64-linux-gnu/libtirpc.so.3 to /lib/aarch64-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 382s Adding 'diversion of /lib/aarch64-linux-gnu/libtirpc.so.3.0.0 to /lib/aarch64-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 382s Unpacking libtirpc3t64:arm64 (1.3.4+ds-1.1) ... 382s Selecting previously unselected package libwbclient0:arm64. 382s Preparing to unpack .../01-libwbclient0_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 382s Unpacking libwbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 382s Selecting previously unselected package samba-libs:arm64. 382s Preparing to unpack .../02-samba-libs_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 382s Unpacking samba-libs:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 382s Selecting previously unselected package sssd-ad-common. 382s Preparing to unpack .../03-sssd-ad-common_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-ad-common (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-krb5-common. 382s Preparing to unpack .../04-sssd-krb5-common_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package libsmbclient0:arm64. 382s Preparing to unpack .../05-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 382s Unpacking libsmbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 382s Selecting previously unselected package sssd-ad. 382s Preparing to unpack .../06-sssd-ad_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-ad (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package libipa-hbac0t64. 382s Preparing to unpack .../07-libipa-hbac0t64_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-ipa. 382s Preparing to unpack .../08-sssd-ipa_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-ipa (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-krb5. 382s Preparing to unpack .../09-sssd-krb5_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-krb5 (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-ldap. 382s Preparing to unpack .../10-sssd-ldap_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-ldap (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-proxy. 382s Preparing to unpack .../11-sssd-proxy_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-proxy (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd. 382s Preparing to unpack .../12-sssd_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package sssd-dbus. 382s Preparing to unpack .../13-sssd-dbus_2.9.4-1.1ubuntu1_arm64.deb ... 382s Unpacking sssd-dbus (2.9.4-1.1ubuntu1) ... 382s Selecting previously unselected package libjose0:arm64. 382s Preparing to unpack .../14-libjose0_11-3build1_arm64.deb ... 382s Unpacking libjose0:arm64 (11-3build1) ... 382s Selecting previously unselected package libevent-2.1-7:arm64. 382s Preparing to unpack .../15-libevent-2.1-7_2.1.12-stable-9build1_arm64.deb ... 382s Unpacking libevent-2.1-7:arm64 (2.1.12-stable-9build1) ... 382s Selecting previously unselected package libverto-libevent1:arm64. 382s Preparing to unpack .../16-libverto-libevent1_0.3.1-1ubuntu5_arm64.deb ... 382s Unpacking libverto-libevent1:arm64 (0.3.1-1ubuntu5) ... 382s Selecting previously unselected package libverto1:arm64. 382s Preparing to unpack .../17-libverto1_0.3.1-1ubuntu5_arm64.deb ... 382s Unpacking libverto1:arm64 (0.3.1-1ubuntu5) ... 382s Selecting previously unselected package libkrad0:arm64. 382s Preparing to unpack .../18-libkrad0_1.20.1-5.1build2_arm64.deb ... 382s Unpacking libkrad0:arm64 (1.20.1-5.1build2) ... 383s Selecting previously unselected package sssd-idp. 383s Preparing to unpack .../19-sssd-idp_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking sssd-idp (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package sssd-kcm. 383s Preparing to unpack .../20-sssd-kcm_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking sssd-kcm (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package sssd-passkey. 383s Preparing to unpack .../21-sssd-passkey_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking sssd-passkey (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package sssd-tools. 383s Preparing to unpack .../22-sssd-tools_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking sssd-tools (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libipa-hbac-dev. 383s Preparing to unpack .../23-libipa-hbac-dev_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking libipa-hbac-dev (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libsss-certmap-dev. 383s Preparing to unpack .../24-libsss-certmap-dev_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking libsss-certmap-dev (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libsss-idmap-dev. 383s Preparing to unpack .../25-libsss-idmap-dev_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking libsss-idmap-dev (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libsss-nss-idmap-dev. 383s Preparing to unpack .../26-libsss-nss-idmap-dev_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking libsss-nss-idmap-dev (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libnss-sudo. 383s Preparing to unpack .../27-libnss-sudo_1.9.15p5-3ubuntu2_all.deb ... 383s Unpacking libnss-sudo (1.9.15p5-3ubuntu2) ... 383s Selecting previously unselected package libsss-sudo. 383s Preparing to unpack .../28-libsss-sudo_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking libsss-sudo (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package python3-libipa-hbac. 383s Preparing to unpack .../29-python3-libipa-hbac_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking python3-libipa-hbac (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package python3-libsss-nss-idmap. 383s Preparing to unpack .../30-python3-libsss-nss-idmap_2.9.4-1.1ubuntu1_arm64.deb ... 383s Unpacking python3-libsss-nss-idmap (2.9.4-1.1ubuntu1) ... 383s Selecting previously unselected package libltdl7:arm64. 383s Preparing to unpack .../31-libltdl7_2.4.7-7_arm64.deb ... 383s Unpacking libltdl7:arm64 (2.4.7-7) ... 383s Selecting previously unselected package libodbc2:arm64. 383s Preparing to unpack .../32-libodbc2_2.3.12-1_arm64.deb ... 383s Unpacking libodbc2:arm64 (2.3.12-1) ... 383s Selecting previously unselected package slapd. 383s Preparing to unpack .../33-slapd_2.6.7+dfsg-1~exp1ubuntu6_arm64.deb ... 383s Unpacking slapd (2.6.7+dfsg-1~exp1ubuntu6) ... 383s Selecting previously unselected package ldap-utils. 383s Preparing to unpack .../34-ldap-utils_2.6.7+dfsg-1~exp1ubuntu6_arm64.deb ... 383s Unpacking ldap-utils (2.6.7+dfsg-1~exp1ubuntu6) ... 383s Selecting previously unselected package libtcl8.6:arm64. 383s Preparing to unpack .../35-libtcl8.6_8.6.14+dfsg-1_arm64.deb ... 383s Unpacking libtcl8.6:arm64 (8.6.14+dfsg-1) ... 384s Selecting previously unselected package tcl8.6. 384s Preparing to unpack .../36-tcl8.6_8.6.14+dfsg-1_arm64.deb ... 384s Unpacking tcl8.6 (8.6.14+dfsg-1) ... 384s Selecting previously unselected package tcl-expect:arm64. 384s Preparing to unpack .../37-tcl-expect_5.45.4-2build1_arm64.deb ... 384s Unpacking tcl-expect:arm64 (5.45.4-2build1) ... 384s Selecting previously unselected package expect. 384s Preparing to unpack .../38-expect_5.45.4-2build1_arm64.deb ... 384s Unpacking expect (5.45.4-2build1) ... 384s Setting up libpwquality-common (1.4.5-3) ... 384s Setting up libnfsidmap1:arm64 (1:2.6.4-3ubuntu3) ... 384s Setting up libsss-idmap0 (2.9.4-1.1ubuntu1) ... 384s Setting up libbasicobjects0t64:arm64 (0.6.2-2.1) ... 384s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu1) ... 384s Setting up libsss-idmap-dev (2.9.4-1.1ubuntu1) ... 384s Setting up libref-array1t64:arm64 (0.6.2-2.1) ... 384s Setting up libipa-hbac-dev (2.9.4-1.1ubuntu1) ... 384s Setting up libtdb1:arm64 (1.4.10-1) ... 384s Setting up libtirpc-common (1.3.4+ds-1.1) ... 384s Setting up libcollection4t64:arm64 (0.6.2-2.1) ... 384s Setting up libc-ares2:arm64 (1.27.0-1) ... 384s Setting up ldap-utils (2.6.7+dfsg-1~exp1ubuntu6) ... 384s Setting up libjose0:arm64 (11-3build1) ... 384s Setting up libwbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 384s Setting up libtalloc2:arm64 (2.4.2-1build1) ... 384s Setting up libpath-utils1t64:arm64 (0.6.2-2.1) ... 384s Setting up libavahi-common-data:arm64 (0.8-13ubuntu4) ... 384s Setting up libdhash1t64:arm64 (0.6.2-2.1) ... 384s Setting up libevent-2.1-7:arm64 (2.1.12-stable-9build1) ... 384s Setting up libtcl8.6:arm64 (8.6.14+dfsg-1) ... 384s Setting up libltdl7:arm64 (2.4.7-7) ... 384s Setting up libcrack2:arm64 (2.9.6-5.1) ... 384s Setting up libodbc2:arm64 (2.3.12-1) ... 384s Setting up python3-libipa-hbac (2.9.4-1.1ubuntu1) ... 384s Setting up libnss-sudo (1.9.15p5-3ubuntu2) ... 384s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu1) ... 384s Setting up libini-config5t64:arm64 (0.6.2-2.1) ... 384s Setting up libtevent0t64:arm64 (0.16.1-2) ... 384s Setting up libnss-sss:arm64 (2.9.4-1.1ubuntu1) ... 384s Setting up slapd (2.6.7+dfsg-1~exp1ubuntu6) ... 384s Creating new user openldap... done. 385s Creating initial configuration... done. 385s Creating LDAP directory... done. 385s Setting up tcl8.6 (8.6.14+dfsg-1) ... 385s Setting up libtirpc3t64:arm64 (1.3.4+ds-1.1) ... 385s Setting up libsss-sudo (2.9.4-1.1ubuntu1) ... 385s Setting up libsss-nss-idmap-dev (2.9.4-1.1ubuntu1) ... 385s Setting up libavahi-common3:arm64 (0.8-13ubuntu4) ... 385s Setting up tcl-expect:arm64 (5.45.4-2build1) ... 385s Setting up libsss-certmap0 (2.9.4-1.1ubuntu1) ... 385s Setting up libpwquality1:arm64 (1.4.5-3) ... 385s Setting up python3-libsss-nss-idmap (2.9.4-1.1ubuntu1) ... 385s Setting up libldb2:arm64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 385s Setting up libavahi-client3:arm64 (0.8-13ubuntu4) ... 385s Setting up expect (5.45.4-2build1) ... 385s Setting up libpam-pwquality:arm64 (1.4.5-3) ... 386s Setting up samba-libs:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 386s Setting up libsss-certmap-dev (2.9.4-1.1ubuntu1) ... 386s Setting up python3-sss (2.9.4-1.1ubuntu1) ... 386s Setting up libsmbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 386s Setting up libpam-sss:arm64 (2.9.4-1.1ubuntu1) ... 386s Setting up sssd-common (2.9.4-1.1ubuntu1) ... 386s Creating SSSD system user & group... 386s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 386s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 386s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 386s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 387s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 387s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 387s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 388s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 388s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 388s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 388s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 389s sssd-autofs.service is a disabled or a static unit, not starting it. 389s sssd-nss.service is a disabled or a static unit, not starting it. 389s sssd-pam.service is a disabled or a static unit, not starting it. 389s sssd-ssh.service is a disabled or a static unit, not starting it. 389s sssd-sudo.service is a disabled or a static unit, not starting it. 389s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 389s Setting up sssd-proxy (2.9.4-1.1ubuntu1) ... 389s Setting up sssd-kcm (2.9.4-1.1ubuntu1) ... 389s Created symlink /etc/systemd/system/sockets.target.wants/sssd-kcm.socket → /usr/lib/systemd/system/sssd-kcm.socket. 389s sssd-kcm.service is a disabled or a static unit, not starting it. 389s Setting up sssd-dbus (2.9.4-1.1ubuntu1) ... 390s sssd-ifp.service is a disabled or a static unit, not starting it. 390s Setting up sssd-ad-common (2.9.4-1.1ubuntu1) ... 390s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 391s sssd-pac.service is a disabled or a static unit, not starting it. 391s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 391s Setting up sssd-krb5-common (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-krb5 (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-ldap (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-ad (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-tools (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-ipa (2.9.4-1.1ubuntu1) ... 391s Setting up sssd (2.9.4-1.1ubuntu1) ... 391s Setting up libverto-libevent1:arm64 (0.3.1-1ubuntu5) ... 391s Setting up libverto1:arm64 (0.3.1-1ubuntu5) ... 391s Setting up libkrad0:arm64 (1.20.1-5.1build2) ... 391s Setting up sssd-passkey (2.9.4-1.1ubuntu1) ... 391s Setting up sssd-idp (2.9.4-1.1ubuntu1) ... 391s Setting up autopkgtest-satdep (0) ... 391s Processing triggers for libc-bin (2.39-0ubuntu2) ... 391s Processing triggers for ufw (0.36.2-5) ... 391s Processing triggers for man-db (2.12.0-3) ... 392s Processing triggers for dbus (1.14.10-4ubuntu1) ... 404s (Reading database ... 75642 files and directories currently installed.) 404s Removing autopkgtest-satdep (0) ... 405s autopkgtest [13:42:00]: test ldap-user-group-ldap-auth: [----------------------- 405s + . debian/tests/util 405s + . debian/tests/common-tests 405s + mydomain=example.com 405s + myhostname=ldap.example.com 405s + mysuffix=dc=example,dc=com 405s + admin_dn=cn=admin,dc=example,dc=com 405s + admin_pw=secret 405s + ldap_user=testuser1 405s + ldap_user_pw=testuser1secret 405s + ldap_group=ldapusers 405s + adjust_hostname ldap.example.com 405s + local myhostname=ldap.example.com 405s + echo ldap.example.com 405s + hostname ldap.example.com 405s + grep -qE ldap.example.com /etc/hosts 405s + echo 127.0.1.10 ldap.example.com 405s + reconfigure_slapd 405s + debconf-set-selections 406s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 406s + dpkg-reconfigure -fnoninteractive -pcritical slapd 406s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6... done. 406s Moving old database directory to /var/backups: 406s - directory unknown... done. 406s Creating initial configuration... done. 406s Creating LDAP directory... done. 407s + generate_certs ldap.example.com 407s + local cn=ldap.example.com 407s + local cert=/etc/ldap/server.pem 407s + local key=/etc/ldap/server.key 407s + local cnf=/etc/ldap/openssl.cnf 407s + cat 407s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 407s .......++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 407s ......................................................................................................................................................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 407s ----- 407s + chmod 0640 /etc/ldap/server.key 407s + chgrp openldap /etc/ldap/server.key 407s + [ ! -f /etc/ldap/server.pem ] 407s + [ ! -f /etc/ldap/server.key ] 407s + enable_ldap_ssl 407s + cat 407s + cat 407s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 407s modifying entry "cn=config" 407s 407s + populate_ldap_rfc2307 407s + cat 407s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 407s + configure_sssd_ldap_rfc2307 407s + cat 407s adding new entry "ou=People,dc=example,dc=com" 407s 407s adding new entry "ou=Group,dc=example,dc=com" 407s 407s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 407s 407s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 407s 407s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 407s 407s + chmod 0600 /etc/sssd/sssd.conf 407s + systemctl restart sssd 408s + enable_pam_mkhomedir 408s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 408s Assert local user databases do not have our LDAP test data 408s + echo session optional pam_mkhomedir.so 408s + run_common_tests 408s + echo Assert local user databases do not have our LDAP test data 408s + check_local_user testuser1 408s + local local_user=testuser1 408s + grep -q ^testuser1 /etc/passwd 408s + check_local_group testuser1 408s + local local_group=testuser1 408s + grep -q ^testuser1 /etc/group 408s The LDAP user is known to the system via getent 408s + check_local_group ldapusers 408s + local local_group=ldapusers 408s + grep -q ^ldapusers /etc/group 408s + echo The LDAP user is known to the system via getent 408s + check_getent_user testuser1 408s + local getent_user=testuser1 408s + local output 408s + getent passwd testuser1 408s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 408s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 408s + echo The LDAP user's private group is known to the system via getentThe LDAP user's private group is known to the system via getent 408s 408s + check_getent_group testuser1 408s + local getent_group=testuser1 408s + local output 408s + getent group testuser1 408s The LDAP group ldapusers is known to the system via getent 408s + output=testuser1:*:10001:testuser1 408s + [ -z testuser1:*:10001:testuser1 ] 408s + echo The LDAP group ldapusers is known to the system via getent 408s + check_getent_group ldapusers 408s + local getent_group=ldapusers 408s + local output 408s + getent group ldapusers 408s The id(1) command can resolve the group membership of the LDAP user 408s + output=ldapusers:*:10100:testuser1 408s + [ -z ldapusers:*:10100:testuser1 ] 408s + echo The id(1) command can resolve the group membership of the LDAP user 408s + id -Gn testuser1 408s The LDAP user can login on a terminal 408s + output=testuser1 ldapusers 408s + [ testuser1 ldapusers != testuser1 ldapusers ] 408s + echo The LDAP user can login on a terminal 408s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 408s spawn login 408s ldap.example.com login: testuser1 408s Password: 408s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic aarch64) 408s 408s * Documentation: https://help.ubuntu.com 408s * Management: https://landscape.canonical.com 408s * Support: https://ubuntu.com/pro 408s 408s 408s The programs included with the Ubuntu system are free software; 408s the exact distribution terms for each program are described in the 408s individual files in /usr/share/doc/*/copyright. 408s 408s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 408s applicable law. 408s 408s 408s The programs included with the Ubuntu system are free software; 408s the exact distribution terms for each program are described in the 408s individual files in /usr/share/doc/*/copyright. 408s 408s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 408s applicable law. 408s 408s Creating directory '/home/testuser1'. 408s [?2004htestuser1@ldap:~$ id -un 408s [?2004l testuser1 409s [?2004htestuser1@ldap:~$ autopkgtest [13:42:04]: test ldap-user-group-ldap-auth: -----------------------] 410s autopkgtest [13:42:05]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 410s ldap-user-group-ldap-auth PASS 410s autopkgtest [13:42:05]: test ldap-user-group-krb5-auth: preparing testbed 413s Reading package lists... 414s Building dependency tree... 414s Reading state information... 414s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 414s Starting 2 pkgProblemResolver with broken count: 0 414s Done 414s Done 415s Starting pkgProblemResolver with broken count: 0 415s Starting 2 pkgProblemResolver with broken count: 0 415s Done 415s The following additional packages will be installed: 415s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 415s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 415s Suggested packages: 415s krb5-kdc-ldap krb5-kpropd krb5-k5tls krb5-doc 416s The following NEW packages will be installed: 416s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 416s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 416s 0 upgraded, 8 newly installed, 0 to remove and 189 not upgraded. 416s 1 not fully installed or removed. 416s Need to get 597 kB of archives. 416s After this operation, 2914 kB of additional disk space will be used. 416s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgssrpc4t64 arm64 1.20.1-5.1build2 [58.0 kB] 416s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkadm5clnt-mit12 arm64 1.20.1-5.1build2 [40.0 kB] 416s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkdb5-10t64 arm64 1.20.1-5.1build2 [40.5 kB] 416s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkadm5srv-mit12 arm64 1.20.1-5.1build2 [53.4 kB] 416s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 krb5-user arm64 1.20.1-5.1build2 [108 kB] 416s Get:6 http://ftpmaster.internal/ubuntu noble/main arm64 krb5-config all 2.7 [22.0 kB] 416s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 krb5-kdc arm64 1.20.1-5.1build2 [180 kB] 416s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 krb5-admin-server arm64 1.20.1-5.1build2 [94.9 kB] 417s Preconfiguring packages ... 419s Fetched 597 kB in 1s (1020 kB/s) 419s Selecting previously unselected package libgssrpc4t64:arm64. 419s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 75642 files and directories currently installed.) 419s Preparing to unpack .../0-libgssrpc4t64_1.20.1-5.1build2_arm64.deb ... 419s Unpacking libgssrpc4t64:arm64 (1.20.1-5.1build2) ... 419s Selecting previously unselected package libkadm5clnt-mit12:arm64. 419s Preparing to unpack .../1-libkadm5clnt-mit12_1.20.1-5.1build2_arm64.deb ... 419s Unpacking libkadm5clnt-mit12:arm64 (1.20.1-5.1build2) ... 420s Selecting previously unselected package libkdb5-10t64:arm64. 420s Preparing to unpack .../2-libkdb5-10t64_1.20.1-5.1build2_arm64.deb ... 420s Unpacking libkdb5-10t64:arm64 (1.20.1-5.1build2) ... 420s Selecting previously unselected package libkadm5srv-mit12:arm64. 420s Preparing to unpack .../3-libkadm5srv-mit12_1.20.1-5.1build2_arm64.deb ... 420s Unpacking libkadm5srv-mit12:arm64 (1.20.1-5.1build2) ... 420s Selecting previously unselected package krb5-user. 420s Preparing to unpack .../4-krb5-user_1.20.1-5.1build2_arm64.deb ... 420s Unpacking krb5-user (1.20.1-5.1build2) ... 420s Selecting previously unselected package krb5-config. 420s Preparing to unpack .../5-krb5-config_2.7_all.deb ... 420s Unpacking krb5-config (2.7) ... 420s Selecting previously unselected package krb5-kdc. 420s Preparing to unpack .../6-krb5-kdc_1.20.1-5.1build2_arm64.deb ... 420s Unpacking krb5-kdc (1.20.1-5.1build2) ... 420s Selecting previously unselected package krb5-admin-server. 420s Preparing to unpack .../7-krb5-admin-server_1.20.1-5.1build2_arm64.deb ... 420s Unpacking krb5-admin-server (1.20.1-5.1build2) ... 420s Setting up libgssrpc4t64:arm64 (1.20.1-5.1build2) ... 420s Setting up krb5-config (2.7) ... 420s Setting up libkadm5clnt-mit12:arm64 (1.20.1-5.1build2) ... 420s Setting up libkdb5-10t64:arm64 (1.20.1-5.1build2) ... 420s Setting up libkadm5srv-mit12:arm64 (1.20.1-5.1build2) ... 420s Setting up krb5-user (1.20.1-5.1build2) ... 420s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 420s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 420s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 420s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 420s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 420s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 420s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 420s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 420s Setting up krb5-kdc (1.20.1-5.1build2) ... 421s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-kdc.service → /usr/lib/systemd/system/krb5-kdc.service. 421s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 421s Setting up krb5-admin-server (1.20.1-5.1build2) ... 422s Created symlink /etc/systemd/system/multi-user.target.wants/krb5-admin-server.service → /usr/lib/systemd/system/krb5-admin-server.service. 423s Setting up autopkgtest-satdep (0) ... 423s Processing triggers for man-db (2.12.0-3) ... 423s Processing triggers for libc-bin (2.39-0ubuntu2) ... 432s (Reading database ... 75737 files and directories currently installed.) 432s Removing autopkgtest-satdep (0) ... 434s autopkgtest [13:42:29]: test ldap-user-group-krb5-auth: [----------------------- 434s + . debian/tests/util 434s + . debian/tests/common-tests 434s + mydomain=example.com 434s + myhostname=ldap.example.com 434s + mysuffix=dc=example,dc=com 434s + myrealm=EXAMPLE.COM 434s + admin_dn=cn=admin,dc=example,dc=com 434s + admin_pw=secret 434s + ldap_user=testuser1 434s + ldap_user_pw=testuser1secret 434s + kerberos_principal_pw=testuser1kerberos 434s + ldap_group=ldapusers 434s + adjust_hostname ldap.example.com 434s + local myhostname=ldap.example.com 434s + echo ldap.example.com 434s + hostname ldap.example.com 434s + grep -qE ldap.example.com /etc/hosts 434s + reconfigure_slapd 434s + debconf-set-selections 434s + rm -rf /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6 /var/backups/unknown-2.6.7+dfsg-1~exp1ubuntu6-20240312-134201.ldapdb 434s + dpkg-reconfigure -fnoninteractive -pcritical slapd 434s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.7+dfsg-1~exp1ubuntu6... done. 434s Moving old database directory to /var/backups: 434s - directory unknown... done. 434s Creating initial configuration... done. 434s Creating LDAP directory... done. 435s + generate_certs ldap.example.com 435s + local cn=ldap.example.com 435s + local cert=/etc/ldap/server.pem 435s + local key=/etc/ldap/server.key 435s + local cnf=/etc/ldap/openssl.cnf 435s + cat 435s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 435s ...................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 435s .......................................++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 435s ----- 435s + chmod 0640 /etc/ldap/server.key 435s + chgrp openldap /etc/ldap/server.key 435s + [ ! -f /etc/ldap/server.pem ] 435s + [ ! -f /etc/ldap/server.key ] 435s + enable_ldap_ssl 435s + cat 435s + cat 435s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 435s modifying entry "cn=config" 435s 435s + populate_ldap_rfc2307 435s + cat 435s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 435s adding new entry "ou=People,dc=example,dc=com" 435s 435s adding new entry "ou=Group,dc=example,dc=com" 435s 435s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 435s 435s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 435s 435s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 435s 435s + create_realm EXAMPLE.COM ldap.example.com 435s + local realm_name=EXAMPLE.COM 435s + local kerberos_server=ldap.example.com 435s + rm -rf /var/lib/krb5kdc/* 435s + rm -rf /etc/krb5kdc/kdc.conf 435s + rm -f /etc/krb5.keytab 435s + cat 435s + cat 435s + echo # */admin * 435s + kdb5_util create -s -P secretpassword 435s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 435s master key name 'K/M@EXAMPLE.COM' 435s + systemctl restart krb5-kdc.service krb5-admin-server.service 435s + create_krb_principal testuser1 testuser1kerberos 435s + local principal=testuser1 435s + local password=testuser1kerberos 435s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 435s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 435s Authenticating as principal root/admin@EXAMPLE.COM with password. 435s Principal "testuser1@EXAMPLE.COM" created. 435s + configure_sssd_ldap_rfc2307_krb5_auth 435s + cat 435s + chmod 0600 /etc/sssd/sssd.conf 435s + systemctl restart sssd 435s Assert local user databases do not have our LDAP test data 435s + enable_pam_mkhomedir 435s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 435s + run_common_tests 435s + echo Assert local user databases do not have our LDAP test data 435s + check_local_user testuser1 435s + local local_user=testuser1 435s + grep -q ^testuser1 /etc/passwd 435s + check_local_group testuser1 435s + local local_group=testuser1 435s + grep -q ^testuser1 /etc/group 435s + check_local_group ldapusers 435s + local local_group=ldapusers 435s + grep -q ^ldapusers /etc/group 435s + echo The LDAP user is known to the system via getent 435s + check_getent_user testuser1 435s + local getent_user=testuser1 435s + local output 435s + getent passwd testuser1 435s The LDAP user is known to the system via getent 435s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 435s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 435s + echo The LDAP user's private group is known to the system via getent 435s + check_getent_group testuser1 435s + local getent_group=testuser1 435s + local output 435s + getent group testuser1 435s The LDAP user's private group is known to the system via getent 435s The LDAP group ldapusers is known to the system via getent 435s + output=testuser1:*:10001:testuser1 435s + [ -z testuser1:*:10001:testuser1 ] 435s + echo The LDAP group ldapusers is known to the system via getent 435s + check_getent_group ldapusers 435s + local getent_group=ldapusers 435s + local output 435s + getent group ldapusers 435s + output=ldapusers:*:10100:testuser1 435s + [ -z ldapusers:*:10100:testuser1 ] 435s + echo The id(1) command can resolve the group membership of the LDAP user 435s + id -Gn testuser1 435s The id(1) command can resolve the group membership of the LDAP user 435s The Kerberos principal can login on a terminal 435s + output=testuser1 ldapusers 435s + [ testuser1 ldapusers != testuser1 ldapusers ] 435s + echo The Kerberos principal can login on a terminal 435s + kdestroy 435s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 435s spawn login 436s ldap.example.com login: testuser1 436s Password: 436s Welcome to Ubuntu Noble Numbat (development branch) (GNU/Linux 6.8.0-11-generic aarch64) 436s 436s * Documentation: https://help.ubuntu.com 436s * Management: https://landscape.canonical.com 436s * Support: https://ubuntu.com/pro 436s 436s 436s The programs included with the Ubuntu system are free software; 436s the exact distribution terms for each program are described in the 436s individual files in /usr/share/doc/*/copyright. 436s 436s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 436s applicable law. 436s 436s Last login: Tue Mar 12 13:42:03 UTC 2024 on pts/0 436s [?2004htestuser1@ldap:~$ id -un 436s [?2004l testuser1 436s [?2004htestuser1@ldap:~$ klist 436s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_uzg5DL 436s Default principal: testuser1@EXAMPLE.COM 436s 436s Valid starting Expires Service principal 436s 03/12/24 13:42:31 03/12/24 23:42:31 krbtgt/EXAMPLE.COM@EXAMPLE.COM 436s renew until 03/13/24 13:42:31 436s [?2004htestuser1@ldap:~$ autopkgtest [13:42:31]: test ldap-user-group-krb5-auth: -----------------------] 437s ldap-user-group-krb5-auth PASS 437s autopkgtest [13:42:32]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 438s autopkgtest [13:42:33]: test sssd-softhism2-certificates-tests.sh: preparing testbed 543s autopkgtest [13:44:18]: @@@@@@@@@@@@@@@@@@@@ test bed setup 544s Get:1 http://ftpmaster.internal/ubuntu noble-proposed InRelease [117 kB] 545s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe Sources [2783 kB] 547s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main Sources [449 kB] 547s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/restricted Sources [4812 B] 547s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/multiverse Sources [40.9 kB] 547s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 Packages [601 kB] 547s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 c-n-f Metadata [3144 B] 547s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 Packages [20.3 kB] 547s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/restricted arm64 c-n-f Metadata [116 B] 547s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 Packages [3225 kB] 548s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 c-n-f Metadata [8528 B] 548s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 Packages [52.3 kB] 548s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/multiverse arm64 c-n-f Metadata [116 B] 550s Fetched 7306 kB in 5s (1589 kB/s) 550s Reading package lists... 554s Reading package lists... 554s Building dependency tree... 554s Reading state information... 555s Calculating upgrade... 555s The following packages were automatically installed and are no longer required: 555s libgdbm-compat4t64 libperl5.38 lto-disabled-list make perl-modules-5.38 555s Use 'sudo apt autoremove' to remove them. 555s The following packages will be REMOVED: 555s dpkg-dev libcom-err2 libdpkg-perl libext2fs2 libgdbm-compat4 libgdbm6 555s libgnutls30 libhogweed6 libnettle8 libpsl5 libss2 libssl3 libuv1 perl 555s The following NEW packages will be installed: 555s libcom-err2t64 libext2fs2t64 libgdbm-compat4t64 libgdbm6t64 libgnutls30t64 555s libhogweed6t64 libnettle8t64 libpsl5t64 libss2t64 libssl3t64 libuv1t64 555s The following packages have been kept back: 555s libperl5.38 libsasl2-2 libsasl2-modules-db 555s The following packages will be upgraded: 555s bind9-dnsutils bind9-host bind9-libs curl e2fsprogs e2fsprogs-l10n 555s firmware-sof-signed krb5-locales libcurl3-gnutls libcurl4 libgssapi-krb5-2 555s libk5crypto3 libkrb5-3 libkrb5support0 libldap-common libldap2 555s libsasl2-modules logsave perl-base perl-modules-5.38 sudo 555s 21 upgraded, 11 newly installed, 14 to remove and 3 not upgraded. 555s Need to get 17.2 MB of archives. 555s After this operation, 3395 kB disk space will be freed. 555s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl-base arm64 5.38.2-3.2 [1777 kB] 556s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libss2t64 arm64 1.47.0-2.3ubuntu1 [16.6 kB] 556s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcom-err2t64 arm64 1.47.0-2.3ubuntu1 [22.2 kB] 556s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 logsave arm64 1.47.0-2.3ubuntu1 [21.9 kB] 556s Get:5 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 e2fsprogs-l10n all 1.47.0-2.3ubuntu1 [5994 B] 556s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libext2fs2t64 arm64 1.47.0-2.3ubuntu1 [214 kB] 556s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 e2fsprogs arm64 1.47.0-2.3ubuntu1 [592 kB] 556s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgdbm6t64 arm64 1.23-5.1 [34.3 kB] 556s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgdbm-compat4t64 arm64 1.23-5.1 [6576 B] 556s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sudo arm64 1.9.15p5-3ubuntu2 [928 kB] 556s Get:11 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-modules arm64 2.1.28+dfsg1-4ubuntu4 [69.5 kB] 556s Get:12 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libk5crypto3 arm64 1.20.1-5.1build2 [85.6 kB] 556s Get:13 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgssapi-krb5-2 arm64 1.20.1-5.1build2 [141 kB] 556s Get:14 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkrb5support0 arm64 1.20.1-5.1build2 [33.8 kB] 556s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libkrb5-3 arm64 1.20.1-5.1build2 [349 kB] 556s Get:16 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libuv1t64 arm64 1.48.0-1.1 [95.3 kB] 556s Get:17 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-host arm64 1:9.18.24-0ubuntu3 [50.2 kB] 556s Get:18 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-dnsutils arm64 1:9.18.24-0ubuntu3 [155 kB] 556s Get:19 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 bind9-libs arm64 1:9.18.24-0ubuntu3 [1197 kB] 556s Get:20 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libssl3t64 arm64 3.0.13-0ubuntu1 [1770 kB] 556s Get:21 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 curl arm64 8.5.0-2ubuntu6 [222 kB] 556s Get:22 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcurl4 arm64 8.5.0-2ubuntu6 [332 kB] 556s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libpsl5t64 arm64 0.21.2-1.1 [57.4 kB] 556s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libcurl3-gnutls arm64 8.5.0-2ubuntu6 [327 kB] 556s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnettle8t64 arm64 3.9.1-2.2 [192 kB] 556s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libhogweed6t64 arm64 3.9.1-2.2 [199 kB] 556s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgnutls30t64 arm64 3.8.3-1.1ubuntu2 [1042 kB] 556s Get:28 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl-modules-5.38 all 5.38.2-3.2 [3110 kB] 556s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 krb5-locales all 1.20.1-5.1build2 [13.8 kB] 556s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldap2 arm64 2.6.7+dfsg-1~exp1ubuntu6 [193 kB] 556s Get:31 http://ftpmaster.internal/ubuntu noble/main arm64 firmware-sof-signed all 2023.12.1-1ubuntu1 [3906 kB] 557s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldap-common all 2.6.7+dfsg-1~exp1ubuntu6 [31.3 kB] 558s Fetched 17.2 MB in 1s (14.0 MB/s) 558s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74748 files and directories currently installed.) 558s Removing dpkg-dev (1.22.4ubuntu5) ... 558s Removing libdpkg-perl (1.22.4ubuntu5) ... 558s Removing perl (5.38.2-3) ... 558s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 558s Preparing to unpack .../perl-base_5.38.2-3.2_arm64.deb ... 558s Unpacking perl-base (5.38.2-3.2) over (5.38.2-3) ... 559s Setting up perl-base (5.38.2-3.2) ... 559s dpkg: libss2:arm64: dependency problems, but removing anyway as you requested: 559s e2fsprogs depends on libss2 (>= 1.38). 559s 559s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 559s Removing libss2:arm64 (1.47.0-2ubuntu1) ... 559s Selecting previously unselected package libss2t64:arm64. 559s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 559s Preparing to unpack .../libss2t64_1.47.0-2.3ubuntu1_arm64.deb ... 559s Unpacking libss2t64:arm64 (1.47.0-2.3ubuntu1) ... 559s dpkg: libcom-err2:arm64: dependency problems, but removing anyway as you requested: 559s openssh-server depends on libcom-err2 (>= 1.43.9). 559s libreiserfscore0 depends on libcom-err2 (>= 1.43.9). 559s libkrb5-3:arm64 depends on libcom-err2 (>= 1.43.9). 559s libgssapi-krb5-2:arm64 depends on libcom-err2 (>= 1.43.9). 559s inetutils-telnet depends on libcom-err2 (>= 1.43.9). 559s e2fsprogs depends on libcom-err2 (>= 1.43.9). 559s btrfs-progs depends on libcom-err2 (>= 1.43.9). 559s 559s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74168 files and directories currently installed.) 559s Removing libcom-err2:arm64 (1.47.0-2ubuntu1) ... 559s Selecting previously unselected package libcom-err2t64:arm64. 559s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74163 files and directories currently installed.) 559s Preparing to unpack .../libcom-err2t64_1.47.0-2.3ubuntu1_arm64.deb ... 559s Unpacking libcom-err2t64:arm64 (1.47.0-2.3ubuntu1) ... 560s Preparing to unpack .../logsave_1.47.0-2.3ubuntu1_arm64.deb ... 560s Unpacking logsave (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 560s Preparing to unpack .../e2fsprogs-l10n_1.47.0-2.3ubuntu1_all.deb ... 560s Unpacking e2fsprogs-l10n (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 560s dpkg: libext2fs2:arm64: dependency problems, but removing anyway as you requested: 560s libblockdev-fs3:arm64 depends on libext2fs2 (>= 1.42.11). 560s e2fsprogs depends on libext2fs2 (= 1.47.0-2ubuntu1). 560s btrfs-progs depends on libext2fs2 (>= 1.42). 560s 560s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 560s Removing libext2fs2:arm64 (1.47.0-2ubuntu1) ... 560s Selecting previously unselected package libext2fs2t64:arm64. 560s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 560s Preparing to unpack .../libext2fs2t64_1.47.0-2.3ubuntu1_arm64.deb ... 560s Unpacking libext2fs2t64:arm64 (1.47.0-2.3ubuntu1) ... 560s Setting up libcom-err2t64:arm64 (1.47.0-2.3ubuntu1) ... 560s Setting up libext2fs2t64:arm64 (1.47.0-2.3ubuntu1) ... 560s Setting up libss2t64:arm64 (1.47.0-2.3ubuntu1) ... 560s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 560s Preparing to unpack .../e2fsprogs_1.47.0-2.3ubuntu1_arm64.deb ... 560s Unpacking e2fsprogs (1.47.0-2.3ubuntu1) over (1.47.0-2ubuntu1) ... 560s dpkg: libgdbm6:arm64: dependency problems, but removing anyway as you requested: 560s python3-gdbm:arm64 depends on libgdbm6 (>= 1.16). 560s man-db depends on libgdbm6 (>= 1.16). 560s libperl5.38:arm64 depends on libgdbm6 (>= 1.21). 560s libgdbm-compat4:arm64 depends on libgdbm6 (>= 1.16). 560s 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 561s Removing libgdbm6:arm64 (1.23-5) ... 561s Selecting previously unselected package libgdbm6t64:arm64. 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74165 files and directories currently installed.) 561s Preparing to unpack .../libgdbm6t64_1.23-5.1_arm64.deb ... 561s Unpacking libgdbm6t64:arm64 (1.23-5.1) ... 561s dpkg: libgdbm-compat4:arm64: dependency problems, but removing anyway as you requested: 561s libperl5.38:arm64 depends on libgdbm-compat4 (>= 1.18-3). 561s 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74171 files and directories currently installed.) 561s Removing libgdbm-compat4:arm64 (1.23-5) ... 561s Selecting previously unselected package libgdbm-compat4t64:arm64. 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74166 files and directories currently installed.) 561s Preparing to unpack .../0-libgdbm-compat4t64_1.23-5.1_arm64.deb ... 561s Unpacking libgdbm-compat4t64:arm64 (1.23-5.1) ... 561s Preparing to unpack .../1-sudo_1.9.15p5-3ubuntu2_arm64.deb ... 561s Unpacking sudo (1.9.15p5-3ubuntu2) over (1.9.15p5-3ubuntu1) ... 561s Preparing to unpack .../2-libsasl2-modules_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 561s Unpacking libsasl2-modules:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 561s Preparing to unpack .../3-libk5crypto3_1.20.1-5.1build2_arm64.deb ... 561s Unpacking libk5crypto3:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 561s Preparing to unpack .../4-libgssapi-krb5-2_1.20.1-5.1build2_arm64.deb ... 561s Unpacking libgssapi-krb5-2:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 561s Preparing to unpack .../5-libkrb5support0_1.20.1-5.1build2_arm64.deb ... 561s Unpacking libkrb5support0:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 561s Preparing to unpack .../6-libkrb5-3_1.20.1-5.1build2_arm64.deb ... 561s Unpacking libkrb5-3:arm64 (1.20.1-5.1build2) over (1.20.1-5build1) ... 561s dpkg: libuv1:arm64: dependency problems, but removing anyway as you requested: 561s bind9-libs:arm64 depends on libuv1 (>= 1.40.0). 561s 561s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74172 files and directories currently installed.) 561s Removing libuv1:arm64 (1.48.0-1) ... 562s Selecting previously unselected package libuv1t64:arm64. 562s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74167 files and directories currently installed.) 562s Preparing to unpack .../libuv1t64_1.48.0-1.1_arm64.deb ... 562s Unpacking libuv1t64:arm64 (1.48.0-1.1) ... 562s Preparing to unpack .../bind9-host_1%3a9.18.24-0ubuntu3_arm64.deb ... 562s Unpacking bind9-host (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 562s Preparing to unpack .../bind9-dnsutils_1%3a9.18.24-0ubuntu3_arm64.deb ... 562s Unpacking bind9-dnsutils (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 562s Preparing to unpack .../bind9-libs_1%3a9.18.24-0ubuntu3_arm64.deb ... 562s Unpacking bind9-libs:arm64 (1:9.18.24-0ubuntu3) over (1:9.18.21-0ubuntu1) ... 563s dpkg: libssl3:arm64: dependency problems, but removing anyway as you requested: 563s wget depends on libssl3 (>= 3.0.0). 563s u-boot-tools depends on libssl3 (>= 3.0.0). 563s tnftp depends on libssl3 (>= 3.0.0). 563s tcpdump depends on libssl3 (>= 3.0.0). 563s systemd-resolved depends on libssl3 (>= 3.0.0). 563s systemd depends on libssl3 (>= 3.0.0). 563s sbsigntool depends on libssl3 (>= 3.0.0). 563s rsync depends on libssl3 (>= 3.0.0). 563s python3-cryptography depends on libssl3 (>= 3.0.0). 563s openssl depends on libssl3 (>= 3.0.9). 563s openssh-server depends on libssl3 (>= 3.0.10). 563s openssh-client depends on libssl3 (>= 3.0.10). 563s mtd-utils depends on libssl3 (>= 3.0.0). 563s mokutil depends on libssl3 (>= 3.0.0). 563s linux-headers-6.8.0-11-generic depends on libssl3 (>= 3.0.0). 563s libsystemd-shared:arm64 depends on libssl3 (>= 3.0.0). 563s libssh-4:arm64 depends on libssl3 (>= 3.0.0). 563s libsasl2-2:arm64 depends on libssl3 (>= 3.0.0). 563s libpython3.12-minimal:arm64 depends on libssl3 (>= 3.0.0). 563s libnvme1 depends on libssl3 (>= 3.0.0). 563s libkmod2:arm64 depends on libssl3 (>= 3.0.0). 563s libfido2-1:arm64 depends on libssl3 (>= 3.0.0). 563s libcurl4:arm64 depends on libssl3 (>= 3.0.0). 563s libcryptsetup12:arm64 depends on libssl3 (>= 3.0.0). 563s kmod depends on libssl3 (>= 3.0.0). 563s dhcpcd-base depends on libssl3 (>= 3.0.0). 563s 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74173 files and directories currently installed.) 563s Removing libssl3:arm64 (3.0.10-1ubuntu4) ... 563s Selecting previously unselected package libssl3t64:arm64. 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74162 files and directories currently installed.) 563s Preparing to unpack .../libssl3t64_3.0.13-0ubuntu1_arm64.deb ... 563s Unpacking libssl3t64:arm64 (3.0.13-0ubuntu1) ... 563s Preparing to unpack .../curl_8.5.0-2ubuntu6_arm64.deb ... 563s Unpacking curl (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 563s Preparing to unpack .../libcurl4_8.5.0-2ubuntu6_arm64.deb ... 563s Unpacking libcurl4:arm64 (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 563s dpkg: libpsl5:arm64: dependency problems, but removing anyway as you requested: 563s wget depends on libpsl5 (>= 0.16.0). 563s libcurl3-gnutls:arm64 depends on libpsl5 (>= 0.16.0). 563s 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74175 files and directories currently installed.) 563s Removing libpsl5:arm64 (0.21.2-1build1) ... 563s Selecting previously unselected package libpsl5t64:arm64. 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74170 files and directories currently installed.) 563s Preparing to unpack .../libpsl5t64_0.21.2-1.1_arm64.deb ... 563s Unpacking libpsl5t64:arm64 (0.21.2-1.1) ... 563s Preparing to unpack .../libcurl3-gnutls_8.5.0-2ubuntu6_arm64.deb ... 563s Unpacking libcurl3-gnutls:arm64 (8.5.0-2ubuntu6) over (8.5.0-2ubuntu2) ... 563s dpkg: libnettle8:arm64: dependency problems, but removing anyway as you requested: 563s librtmp1:arm64 depends on libnettle8. 563s libhogweed6:arm64 depends on libnettle8. 563s libgnutls30:arm64 depends on libnettle8 (>= 3.9~). 563s libarchive13:arm64 depends on libnettle8. 563s 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74176 files and directories currently installed.) 563s Removing libnettle8:arm64 (3.9.1-2) ... 563s Selecting previously unselected package libnettle8t64:arm64. 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 563s Preparing to unpack .../libnettle8t64_3.9.1-2.2_arm64.deb ... 563s Unpacking libnettle8t64:arm64 (3.9.1-2.2) ... 563s dpkg: libhogweed6:arm64: dependency problems, but removing anyway as you requested: 563s librtmp1:arm64 depends on libhogweed6. 563s libjcat1:arm64 depends on libhogweed6. 563s libgnutls30:arm64 depends on libhogweed6 (>= 3.6). 563s 563s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74177 files and directories currently installed.) 563s Removing libhogweed6:arm64 (3.9.1-2) ... 564s Selecting previously unselected package libhogweed6t64:arm64. 564s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74172 files and directories currently installed.) 564s Preparing to unpack .../libhogweed6t64_3.9.1-2.2_arm64.deb ... 564s Unpacking libhogweed6t64:arm64 (3.9.1-2.2) ... 564s dpkg: libgnutls30:arm64: dependency problems, but removing anyway as you requested: 564s u-boot-tools depends on libgnutls30 (>= 3.7.3). 564s librtmp1:arm64 depends on libgnutls30 (>= 3.7.2). 564s libldap2:arm64 depends on libgnutls30 (>= 3.8.2). 564s libjcat1:arm64 depends on libgnutls30 (>= 3.7.3). 564s fwupd depends on libgnutls30 (>= 3.7.3). 564s dirmngr depends on libgnutls30 (>= 3.8.1). 564s apt depends on libgnutls30 (>= 3.8.1). 564s 564s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74178 files and directories currently installed.) 564s Removing libgnutls30:arm64 (3.8.3-1ubuntu1) ... 564s Selecting previously unselected package libgnutls30t64:arm64. 564s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74169 files and directories currently installed.) 564s Preparing to unpack .../libgnutls30t64_3.8.3-1.1ubuntu2_arm64.deb ... 564s Unpacking libgnutls30t64:arm64 (3.8.3-1.1ubuntu2) ... 564s Setting up libnettle8t64:arm64 (3.9.1-2.2) ... 564s Setting up libhogweed6t64:arm64 (3.9.1-2.2) ... 564s Setting up libgnutls30t64:arm64 (3.8.3-1.1ubuntu2) ... 564s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74197 files and directories currently installed.) 564s Preparing to unpack .../perl-modules-5.38_5.38.2-3.2_all.deb ... 564s Unpacking perl-modules-5.38 (5.38.2-3.2) over (5.38.2-3) ... 565s Preparing to unpack .../krb5-locales_1.20.1-5.1build2_all.deb ... 565s Unpacking krb5-locales (1.20.1-5.1build2) over (1.20.1-5build1) ... 565s Preparing to unpack .../libldap2_2.6.7+dfsg-1~exp1ubuntu6_arm64.deb ... 565s Unpacking libldap2:arm64 (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 565s Preparing to unpack .../firmware-sof-signed_2023.12.1-1ubuntu1_all.deb ... 565s Unpacking firmware-sof-signed (2023.12.1-1ubuntu1) over (2.2.6-1ubuntu4) ... 565s Preparing to unpack .../libldap-common_2.6.7+dfsg-1~exp1ubuntu6_all.deb ... 565s Unpacking libldap-common (2.6.7+dfsg-1~exp1ubuntu6) over (2.6.7+dfsg-1~exp1ubuntu1) ... 565s Setting up libgdbm6t64:arm64 (1.23-5.1) ... 565s Setting up libgdbm-compat4t64:arm64 (1.23-5.1) ... 565s Setting up libssl3t64:arm64 (3.0.13-0ubuntu1) ... 565s Setting up firmware-sof-signed (2023.12.1-1ubuntu1) ... 565s Setting up libsasl2-modules:arm64 (2.1.28+dfsg1-4ubuntu4) ... 565s Setting up libuv1t64:arm64 (1.48.0-1.1) ... 565s Setting up libpsl5t64:arm64 (0.21.2-1.1) ... 565s Setting up krb5-locales (1.20.1-5.1build2) ... 565s Setting up libldap-common (2.6.7+dfsg-1~exp1ubuntu6) ... 565s Setting up libkrb5support0:arm64 (1.20.1-5.1build2) ... 565s Setting up perl-modules-5.38 (5.38.2-3.2) ... 565s Setting up sudo (1.9.15p5-3ubuntu2) ... 565s Setting up libk5crypto3:arm64 (1.20.1-5.1build2) ... 565s Setting up logsave (1.47.0-2.3ubuntu1) ... 565s Setting up libkrb5-3:arm64 (1.20.1-5.1build2) ... 565s Setting up libldap2:arm64 (2.6.7+dfsg-1~exp1ubuntu6) ... 565s Setting up e2fsprogs (1.47.0-2.3ubuntu1) ... 565s update-initramfs: deferring update (trigger activated) 566s e2scrub_all.service is a disabled or a static unit not running, not starting it. 566s Setting up libgssapi-krb5-2:arm64 (1.20.1-5.1build2) ... 566s Setting up libcurl4:arm64 (8.5.0-2ubuntu6) ... 566s Setting up curl (8.5.0-2ubuntu6) ... 566s Setting up bind9-libs:arm64 (1:9.18.24-0ubuntu3) ... 566s Setting up e2fsprogs-l10n (1.47.0-2.3ubuntu1) ... 566s Setting up libcurl3-gnutls:arm64 (8.5.0-2ubuntu6) ... 566s Setting up bind9-host (1:9.18.24-0ubuntu3) ... 566s Setting up bind9-dnsutils (1:9.18.24-0ubuntu3) ... 566s Processing triggers for man-db (2.12.0-3) ... 567s Processing triggers for libc-bin (2.39-0ubuntu2) ... 567s Processing triggers for initramfs-tools (0.142ubuntu20) ... 568s update-initramfs: Generating /boot/initrd.img-6.8.0-11-generic 568s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 604s System running in EFI mode, skipping. 605s Reading package lists... 605s Building dependency tree... 605s Reading state information... 606s The following packages will be REMOVED: 606s libgdbm-compat4t64* libperl5.38* lto-disabled-list* make* perl-modules-5.38* 606s 0 upgraded, 0 newly installed, 5 to remove and 2 not upgraded. 606s After this operation, 52.0 MB disk space will be freed. 606s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74208 files and directories currently installed.) 606s Removing libperl5.38:arm64 (5.38.2-3) ... 606s Removing libgdbm-compat4t64:arm64 (1.23-5.1) ... 606s Removing lto-disabled-list (47) ... 606s Removing make (4.3-4.1build1) ... 606s Removing perl-modules-5.38 (5.38.2-3.2) ... 607s Processing triggers for man-db (2.12.0-3) ... 607s Processing triggers for libc-bin (2.39-0ubuntu2) ... 608s sh: Attempting to set up Debian/Ubuntu apt sources automatically 608s sh: Distribution appears to be Ubuntu 609s Reading package lists... 609s Building dependency tree... 609s Reading state information... 610s eatmydata is already the newest version (131-1). 610s dbus is already the newest version (1.14.10-4ubuntu1). 610s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 610s Reading package lists... 610s Building dependency tree... 610s Reading state information... 611s rng-tools-debian is already the newest version (2.4). 611s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 611s Reading package lists... 611s Building dependency tree... 611s Reading state information... 612s haveged is already the newest version (1.9.14-1ubuntu1). 612s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 612s Reading package lists... 612s Building dependency tree... 612s Reading state information... 613s The following additional packages will be installed: 613s libdb5.3t64 libdpkg-perl libgdbm-compat4t64 libperl5.38t64 lto-disabled-list 613s make perl perl-modules-5.38 613s Suggested packages: 613s debian-keyring gcc | c-compiler git bzr make-doc perl-doc 613s libterm-readline-gnu-perl | libterm-readline-perl-perl 613s libtap-harness-archive-perl 613s Recommended packages: 613s build-essential gcc | c-compiler fakeroot libalgorithm-merge-perl 613s libfile-fcntllock-perl 613s The following packages will be REMOVED: 613s libdb5.3 613s The following NEW packages will be installed: 613s dpkg-dev libdb5.3t64 libdpkg-perl libgdbm-compat4t64 libperl5.38t64 613s lto-disabled-list make perl perl-modules-5.38 613s 0 upgraded, 9 newly installed, 1 to remove and 2 not upgraded. 613s Need to get 7257 kB/10.4 MB of archives. 613s After this operation, 56.1 MB of additional disk space will be used. 613s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libdb5.3t64 arm64 5.3.28+dfsg2-5 [719 kB] 614s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libperl5.38t64 arm64 5.38.2-3.2 [4771 kB] 615s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 perl arm64 5.38.2-3.2 [231 kB] 615s Get:4 http://ftpmaster.internal/ubuntu noble/main arm64 libdpkg-perl all 1.22.4ubuntu5 [268 kB] 615s Get:5 http://ftpmaster.internal/ubuntu noble/main arm64 make arm64 4.3-4.1build1 [177 kB] 615s Get:6 http://ftpmaster.internal/ubuntu noble/main arm64 lto-disabled-list all 47 [12.4 kB] 615s Get:7 http://ftpmaster.internal/ubuntu noble/main arm64 dpkg-dev all 1.22.4ubuntu5 [1078 kB] 615s Fetched 7257 kB in 2s (3499 kB/s) 615s dpkg: libdb5.3:arm64: dependency problems, but removing anyway as you requested: 615s libsasl2-modules-db:arm64 depends on libdb5.3. 615s libpython3.12-stdlib:arm64 depends on libdb5.3. 615s libpam-modules:arm64 depends on libdb5.3. 615s iproute2 depends on libdb5.3. 615s apt-utils depends on libdb5.3. 615s 616s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72237 files and directories currently installed.) 616s Removing libdb5.3:arm64 (5.3.28+dfsg2-4) ... 616s Selecting previously unselected package libdb5.3t64:arm64. 616s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72231 files and directories currently installed.) 616s Preparing to unpack .../libdb5.3t64_5.3.28+dfsg2-5_arm64.deb ... 616s Unpacking libdb5.3t64:arm64 (5.3.28+dfsg2-5) ... 616s Setting up libdb5.3t64:arm64 (5.3.28+dfsg2-5) ... 616s Selecting previously unselected package perl-modules-5.38. 616s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72237 files and directories currently installed.) 616s Preparing to unpack .../0-perl-modules-5.38_5.38.2-3.2_all.deb ... 616s Unpacking perl-modules-5.38 (5.38.2-3.2) ... 616s Selecting previously unselected package libgdbm-compat4t64:arm64. 616s Preparing to unpack .../1-libgdbm-compat4t64_1.23-5.1_arm64.deb ... 616s Unpacking libgdbm-compat4t64:arm64 (1.23-5.1) ... 616s Selecting previously unselected package libperl5.38t64:arm64. 616s Preparing to unpack .../2-libperl5.38t64_5.38.2-3.2_arm64.deb ... 616s Unpacking libperl5.38t64:arm64 (5.38.2-3.2) ... 616s Selecting previously unselected package perl. 616s Preparing to unpack .../3-perl_5.38.2-3.2_arm64.deb ... 616s Unpacking perl (5.38.2-3.2) ... 617s Selecting previously unselected package libdpkg-perl. 617s Preparing to unpack .../4-libdpkg-perl_1.22.4ubuntu5_all.deb ... 617s Unpacking libdpkg-perl (1.22.4ubuntu5) ... 617s Selecting previously unselected package make. 617s Preparing to unpack .../5-make_4.3-4.1build1_arm64.deb ... 617s Unpacking make (4.3-4.1build1) ... 617s Selecting previously unselected package lto-disabled-list. 617s Preparing to unpack .../6-lto-disabled-list_47_all.deb ... 617s Unpacking lto-disabled-list (47) ... 617s Selecting previously unselected package dpkg-dev. 617s Preparing to unpack .../7-dpkg-dev_1.22.4ubuntu5_all.deb ... 617s Unpacking dpkg-dev (1.22.4ubuntu5) ... 617s Setting up lto-disabled-list (47) ... 617s Setting up libgdbm-compat4t64:arm64 (1.23-5.1) ... 617s Setting up make (4.3-4.1build1) ... 617s Setting up perl-modules-5.38 (5.38.2-3.2) ... 617s Setting up libperl5.38t64:arm64 (5.38.2-3.2) ... 617s Setting up perl (5.38.2-3.2) ... 617s Setting up libdpkg-perl (1.22.4ubuntu5) ... 617s Setting up dpkg-dev (1.22.4ubuntu5) ... 617s Processing triggers for man-db (2.12.0-3) ... 618s Processing triggers for libc-bin (2.39-0ubuntu2) ... 618s Reading package lists... 618s Building dependency tree... 618s Reading state information... 619s The following packages will be REMOVED: 619s cloud-init* python3-configobj* python3-debconf* 619s 0 upgraded, 0 newly installed, 3 to remove and 2 not upgraded. 619s After this operation, 3248 kB disk space will be freed. 619s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74789 files and directories currently installed.) 619s Removing cloud-init (24.1-0ubuntu1) ... 620s Removing python3-configobj (5.0.8-3) ... 620s Removing python3-debconf (1.5.86) ... 620s Processing triggers for man-db (2.12.0-3) ... 620s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74400 files and directories currently installed.) 620s Purging configuration files for cloud-init (24.1-0ubuntu1) ... 621s dpkg: warning: while removing cloud-init, directory '/etc/cloud/cloud.cfg.d' not empty so not removed 621s Processing triggers for rsyslog (8.2312.0-3ubuntu3) ... 622s Reading package lists... 622s Building dependency tree... 622s Reading state information... 623s linux-generic is already the newest version (6.8.0-11.11+1). 623s 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded. 623s Hit:1 http://ftpmaster.internal/ubuntu noble InRelease 623s Hit:2 http://ftpmaster.internal/ubuntu noble-updates InRelease 623s Hit:3 http://ftpmaster.internal/ubuntu noble-security InRelease 623s Hit:4 http://ftpmaster.internal/ubuntu noble-proposed InRelease 625s Reading package lists... 625s Reading package lists... 626s Building dependency tree... 626s Reading state information... 627s Calculating upgrade... 628s The following packages will be upgraded: 628s libsasl2-2 libsasl2-modules-db 628s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 628s Need to get 76.1 kB of archives. 628s After this operation, 0 B of additional disk space will be used. 628s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-modules-db arm64 2.1.28+dfsg1-4ubuntu4 [21.5 kB] 628s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsasl2-2 arm64 2.1.28+dfsg1-4ubuntu4 [54.7 kB] 630s Fetched 76.1 kB in 1s (144 kB/s) 630s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 630s Preparing to unpack .../libsasl2-modules-db_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 630s Unpacking libsasl2-modules-db:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 630s Preparing to unpack .../libsasl2-2_2.1.28+dfsg1-4ubuntu4_arm64.deb ... 630s Unpacking libsasl2-2:arm64 (2.1.28+dfsg1-4ubuntu4) over (2.1.28+dfsg1-4) ... 630s Setting up libsasl2-modules-db:arm64 (2.1.28+dfsg1-4ubuntu4) ... 630s Setting up libsasl2-2:arm64 (2.1.28+dfsg1-4ubuntu4) ... 630s Processing triggers for man-db (2.12.0-3) ... 630s Processing triggers for libc-bin (2.39-0ubuntu2) ... 631s Reading package lists... 631s Building dependency tree... 631s Reading state information... 632s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 633s autopkgtest [13:45:48]: rebooting testbed after setup commands that affected boot 671s autopkgtest [13:46:26]: testbed dpkg architecture: arm64 678s Reading package lists... 678s Building dependency tree... 678s Reading state information... 678s Correcting dependencies...Starting pkgProblemResolver with broken count: 1 678s Starting 2 pkgProblemResolver with broken count: 1 679s Investigating (0) autopkgtest-satdep:arm64 < 0 @iU K Nb Ib > 679s Broken autopkgtest-satdep:arm64 Depends on sssd:arm64 < none @un H > 679s Considering sssd:arm64 2 as a solution to autopkgtest-satdep:arm64 -2 679s Removing autopkgtest-satdep:arm64 rather than change sssd:arm64 679s Done 679s Done 679s Starting pkgProblemResolver with broken count: 0 679s Starting 2 pkgProblemResolver with broken count: 0 679s Done 680s The following additional packages will be installed: 680s gnutls-bin libevent-2.1-7 libgnutls-dane0t64 libunbound8 680s Suggested packages: 680s dns-root-data 680s The following packages will be REMOVED: 680s autopkgtest-satdep 680s The following NEW packages will be installed: 680s gnutls-bin libevent-2.1-7 libgnutls-dane0t64 libunbound8 681s 0 upgraded, 4 newly installed, 1 to remove and 0 not upgraded. 681s 1 not fully installed or removed. 681s Need to get 871 kB of archives. 681s After this operation, 2917 kB of additional disk space will be used. 681s Get:1 http://ftpmaster.internal/ubuntu noble/main arm64 libevent-2.1-7 arm64 2.1.12-stable-9 [138 kB] 681s Get:2 http://ftpmaster.internal/ubuntu noble/main arm64 libunbound8 arm64 1.19.1-1ubuntu1 [423 kB] 681s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libgnutls-dane0t64 arm64 3.8.3-1.1ubuntu2 [33.0 kB] 681s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 gnutls-bin arm64 3.8.3-1.1ubuntu2 [276 kB] 683s Fetched 871 kB in 1s (874 kB/s) 683s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 683s Removing autopkgtest-satdep (0) ... 683s Selecting previously unselected package libevent-2.1-7:arm64. 683s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74345 files and directories currently installed.) 683s Preparing to unpack .../libevent-2.1-7_2.1.12-stable-9_arm64.deb ... 683s Unpacking libevent-2.1-7:arm64 (2.1.12-stable-9) ... 683s Selecting previously unselected package libunbound8:arm64. 683s Preparing to unpack .../libunbound8_1.19.1-1ubuntu1_arm64.deb ... 683s Unpacking libunbound8:arm64 (1.19.1-1ubuntu1) ... 683s Selecting previously unselected package libgnutls-dane0t64:arm64. 684s Preparing to unpack .../libgnutls-dane0t64_3.8.3-1.1ubuntu2_arm64.deb ... 684s Unpacking libgnutls-dane0t64:arm64 (3.8.3-1.1ubuntu2) ... 684s Selecting previously unselected package gnutls-bin. 684s Preparing to unpack .../gnutls-bin_3.8.3-1.1ubuntu2_arm64.deb ... 684s Unpacking gnutls-bin (3.8.3-1.1ubuntu2) ... 685s Setting up libevent-2.1-7:arm64 (2.1.12-stable-9) ... 685s Setting up libunbound8:arm64 (1.19.1-1ubuntu1) ... 685s Setting up libgnutls-dane0t64:arm64 (3.8.3-1.1ubuntu2) ... 685s Setting up gnutls-bin (3.8.3-1.1ubuntu2) ... 685s Processing triggers for man-db (2.12.0-3) ... 685s Processing triggers for libc-bin (2.39-0ubuntu2) ... 686s autopkgtest: WARNING: package sssd is not installed though it should be 686s autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt pinning. Retrying with using all packages from noble-proposed 688s Reading package lists... 688s Building dependency tree... 688s Reading state information... 688s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 688s Starting 2 pkgProblemResolver with broken count: 0 688s Done 689s Done 689s Starting pkgProblemResolver with broken count: 0 689s Starting 2 pkgProblemResolver with broken count: 0 689s Done 691s The following additional packages will be installed: 691s libavahi-client3 libavahi-common-data libavahi-common3 libbasicobjects0t64 691s libc-ares2 libcollection4t64 libcrack2 libdhash1t64 libini-config5t64 691s libipa-hbac0t64 libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 691s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 691s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 691s libtalloc2 libtdb1 libtevent0t64 libtirpc-common libtirpc3t64 libwbclient0 691s python3-sss samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common 691s sssd-common sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 691s Suggested packages: 691s adcli libsss-sudo sssd-tools libsasl2-modules-ldap 691s Recommended packages: 691s cracklib-runtime libsasl2-modules-gssapi-mit 691s | libsasl2-modules-gssapi-heimdal ldap-utils 691s The following packages will be REMOVED: 691s libtirpc3 691s The following NEW packages will be installed: 691s libavahi-client3 libavahi-common-data libavahi-common3 libbasicobjects0t64 691s libc-ares2 libcollection4t64 libcrack2 libdhash1t64 libini-config5t64 691s libipa-hbac0t64 libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 691s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 691s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 691s libtalloc2 libtdb1 libtevent0t64 libtirpc3t64 libwbclient0 python3-sss 691s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 691s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 691s The following packages will be upgraded: 691s libtirpc-common 691s 1 upgraded, 42 newly installed, 1 to remove and 191 not upgraded. 691s 1 not fully installed or removed. 691s Need to get 9375 kB of archives. 691s After this operation, 45.7 MB of additional disk space will be used. 691s Get:1 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 softhsm2-common arm64 2.6.1-2.2build2 [5970 B] 691s Get:2 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 libsofthsm2 arm64 2.6.1-2.2build2 [247 kB] 692s Get:3 http://ftpmaster.internal/ubuntu noble-proposed/universe arm64 softhsm2 arm64 2.6.1-2.2build2 [168 kB] 692s Get:4 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtalloc2 arm64 2.4.2-1build1 [26.7 kB] 692s Get:5 http://ftpmaster.internal/ubuntu noble/main arm64 libtdb1 arm64 1.4.10-1 [48.4 kB] 692s Get:6 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtevent0t64 arm64 0.16.1-2 [42.2 kB] 692s Get:7 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libldb2 arm64 2:2.8.0+samba4.19.5+dfsg-4ubuntu2 [188 kB] 692s Get:8 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 python3-sss arm64 2.9.4-1.1ubuntu1 [46.6 kB] 692s Get:9 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-idmap0 arm64 2.9.4-1.1ubuntu1 [22.0 kB] 692s Get:10 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnss-sss arm64 2.9.4-1.1ubuntu1 [31.8 kB] 692s Get:11 http://ftpmaster.internal/ubuntu noble/main arm64 libcrack2 arm64 2.9.6-5.1 [28.7 kB] 692s Get:12 http://ftpmaster.internal/ubuntu noble/main arm64 libpwquality-common all 1.4.5-3 [7658 B] 692s Get:13 http://ftpmaster.internal/ubuntu noble/main arm64 libpwquality1 arm64 1.4.5-3 [13.2 kB] 692s Get:14 http://ftpmaster.internal/ubuntu noble/main arm64 libpam-pwquality arm64 1.4.5-3 [11.6 kB] 692s Get:15 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libpam-sss arm64 2.9.4-1.1ubuntu1 [48.9 kB] 692s Get:16 http://ftpmaster.internal/ubuntu noble/main arm64 libc-ares2 arm64 1.27.0-1 [74.1 kB] 692s Get:17 http://ftpmaster.internal/ubuntu noble/main arm64 libdhash1t64 arm64 0.6.2-2.1 [8854 B] 692s Get:18 http://ftpmaster.internal/ubuntu noble/main arm64 libbasicobjects0t64 arm64 0.6.2-2.1 [5868 B] 692s Get:19 http://ftpmaster.internal/ubuntu noble/main arm64 libcollection4t64 arm64 0.6.2-2.1 [23.5 kB] 692s Get:20 http://ftpmaster.internal/ubuntu noble/main arm64 libpath-utils1t64 arm64 0.6.2-2.1 [9090 B] 692s Get:21 http://ftpmaster.internal/ubuntu noble/main arm64 libref-array1t64 arm64 0.6.2-2.1 [7348 B] 692s Get:22 http://ftpmaster.internal/ubuntu noble/main arm64 libini-config5t64 arm64 0.6.2-2.1 [44.6 kB] 692s Get:23 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libnfsidmap1 arm64 1:2.6.4-3ubuntu3 [48.1 kB] 692s Get:24 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-certmap0 arm64 2.9.4-1.1ubuntu1 [45.9 kB] 692s Get:25 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsss-nss-idmap0 arm64 2.9.4-1.1ubuntu1 [30.4 kB] 692s Get:26 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-common arm64 2.9.4-1.1ubuntu1 [1147 kB] 692s Get:27 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-common-data arm64 0.8-13ubuntu4 [29.5 kB] 692s Get:28 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-common3 arm64 0.8-13ubuntu4 [23.3 kB] 692s Get:29 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libavahi-client3 arm64 0.8-13ubuntu4 [27.2 kB] 692s Get:30 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtirpc-common all 1.3.4+ds-1.1 [8018 B] 692s Get:31 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libtirpc3t64 arm64 1.3.4+ds-1.1 [83.5 kB] 692s Get:32 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libwbclient0 arm64 2:4.19.5+dfsg-4ubuntu2 [71.2 kB] 692s Get:33 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 samba-libs arm64 2:4.19.5+dfsg-4ubuntu2 [6061 kB] 693s Get:34 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ad-common arm64 2.9.4-1.1ubuntu1 [75.4 kB] 693s Get:35 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-krb5-common arm64 2.9.4-1.1ubuntu1 [87.9 kB] 693s Get:36 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libsmbclient0 arm64 2:4.19.5+dfsg-4ubuntu2 [62.1 kB] 693s Get:37 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ad arm64 2.9.4-1.1ubuntu1 [134 kB] 693s Get:38 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 libipa-hbac0t64 arm64 2.9.4-1.1ubuntu1 [16.8 kB] 693s Get:39 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ipa arm64 2.9.4-1.1ubuntu1 [220 kB] 693s Get:40 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-krb5 arm64 2.9.4-1.1ubuntu1 [14.3 kB] 693s Get:41 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-ldap arm64 2.9.4-1.1ubuntu1 [31.3 kB] 693s Get:42 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd-proxy arm64 2.9.4-1.1ubuntu1 [44.6 kB] 693s Get:43 http://ftpmaster.internal/ubuntu noble-proposed/main arm64 sssd arm64 2.9.4-1.1ubuntu1 [4120 B] 694s Fetched 9375 kB in 2s (4210 kB/s) 694s Selecting previously unselected package softhsm2-common. 694s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74383 files and directories currently installed.) 694s Preparing to unpack .../00-softhsm2-common_2.6.1-2.2build2_arm64.deb ... 694s Unpacking softhsm2-common (2.6.1-2.2build2) ... 694s Selecting previously unselected package libsofthsm2. 695s Preparing to unpack .../01-libsofthsm2_2.6.1-2.2build2_arm64.deb ... 695s Unpacking libsofthsm2 (2.6.1-2.2build2) ... 695s Selecting previously unselected package softhsm2. 695s Preparing to unpack .../02-softhsm2_2.6.1-2.2build2_arm64.deb ... 695s Unpacking softhsm2 (2.6.1-2.2build2) ... 695s Selecting previously unselected package libtalloc2:arm64. 695s Preparing to unpack .../03-libtalloc2_2.4.2-1build1_arm64.deb ... 695s Unpacking libtalloc2:arm64 (2.4.2-1build1) ... 695s Selecting previously unselected package libtdb1:arm64. 695s Preparing to unpack .../04-libtdb1_1.4.10-1_arm64.deb ... 695s Unpacking libtdb1:arm64 (1.4.10-1) ... 695s Selecting previously unselected package libtevent0t64:arm64. 695s Preparing to unpack .../05-libtevent0t64_0.16.1-2_arm64.deb ... 695s Unpacking libtevent0t64:arm64 (0.16.1-2) ... 695s Selecting previously unselected package libldb2:arm64. 696s Preparing to unpack .../06-libldb2_2%3a2.8.0+samba4.19.5+dfsg-4ubuntu2_arm64.deb ... 696s Unpacking libldb2:arm64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 696s Selecting previously unselected package python3-sss. 696s Preparing to unpack .../07-python3-sss_2.9.4-1.1ubuntu1_arm64.deb ... 696s Unpacking python3-sss (2.9.4-1.1ubuntu1) ... 696s Selecting previously unselected package libsss-idmap0. 696s Preparing to unpack .../08-libsss-idmap0_2.9.4-1.1ubuntu1_arm64.deb ... 696s Unpacking libsss-idmap0 (2.9.4-1.1ubuntu1) ... 696s Selecting previously unselected package libnss-sss:arm64. 696s Preparing to unpack .../09-libnss-sss_2.9.4-1.1ubuntu1_arm64.deb ... 696s Unpacking libnss-sss:arm64 (2.9.4-1.1ubuntu1) ... 696s Selecting previously unselected package libcrack2:arm64. 696s Preparing to unpack .../10-libcrack2_2.9.6-5.1_arm64.deb ... 696s Unpacking libcrack2:arm64 (2.9.6-5.1) ... 696s Selecting previously unselected package libpwquality-common. 696s Preparing to unpack .../11-libpwquality-common_1.4.5-3_all.deb ... 696s Unpacking libpwquality-common (1.4.5-3) ... 696s Selecting previously unselected package libpwquality1:arm64. 696s Preparing to unpack .../12-libpwquality1_1.4.5-3_arm64.deb ... 696s Unpacking libpwquality1:arm64 (1.4.5-3) ... 696s Selecting previously unselected package libpam-pwquality:arm64. 696s Preparing to unpack .../13-libpam-pwquality_1.4.5-3_arm64.deb ... 696s Unpacking libpam-pwquality:arm64 (1.4.5-3) ... 696s Selecting previously unselected package libpam-sss:arm64. 697s Preparing to unpack .../14-libpam-sss_2.9.4-1.1ubuntu1_arm64.deb ... 697s Unpacking libpam-sss:arm64 (2.9.4-1.1ubuntu1) ... 697s Selecting previously unselected package libc-ares2:arm64. 697s Preparing to unpack .../15-libc-ares2_1.27.0-1_arm64.deb ... 697s Unpacking libc-ares2:arm64 (1.27.0-1) ... 697s Selecting previously unselected package libdhash1t64:arm64. 697s Preparing to unpack .../16-libdhash1t64_0.6.2-2.1_arm64.deb ... 697s Unpacking libdhash1t64:arm64 (0.6.2-2.1) ... 697s Selecting previously unselected package libbasicobjects0t64:arm64. 697s Preparing to unpack .../17-libbasicobjects0t64_0.6.2-2.1_arm64.deb ... 697s Unpacking libbasicobjects0t64:arm64 (0.6.2-2.1) ... 697s Selecting previously unselected package libcollection4t64:arm64. 697s Preparing to unpack .../18-libcollection4t64_0.6.2-2.1_arm64.deb ... 697s Unpacking libcollection4t64:arm64 (0.6.2-2.1) ... 697s Selecting previously unselected package libpath-utils1t64:arm64. 697s Preparing to unpack .../19-libpath-utils1t64_0.6.2-2.1_arm64.deb ... 697s Unpacking libpath-utils1t64:arm64 (0.6.2-2.1) ... 698s Selecting previously unselected package libref-array1t64:arm64. 698s Preparing to unpack .../20-libref-array1t64_0.6.2-2.1_arm64.deb ... 698s Unpacking libref-array1t64:arm64 (0.6.2-2.1) ... 698s Selecting previously unselected package libini-config5t64:arm64. 698s Preparing to unpack .../21-libini-config5t64_0.6.2-2.1_arm64.deb ... 698s Unpacking libini-config5t64:arm64 (0.6.2-2.1) ... 698s Selecting previously unselected package libnfsidmap1:arm64. 698s Preparing to unpack .../22-libnfsidmap1_1%3a2.6.4-3ubuntu3_arm64.deb ... 698s Unpacking libnfsidmap1:arm64 (1:2.6.4-3ubuntu3) ... 698s Selecting previously unselected package libsss-certmap0. 698s Preparing to unpack .../23-libsss-certmap0_2.9.4-1.1ubuntu1_arm64.deb ... 698s Unpacking libsss-certmap0 (2.9.4-1.1ubuntu1) ... 698s Selecting previously unselected package libsss-nss-idmap0. 698s Preparing to unpack .../24-libsss-nss-idmap0_2.9.4-1.1ubuntu1_arm64.deb ... 698s Unpacking libsss-nss-idmap0 (2.9.4-1.1ubuntu1) ... 698s Selecting previously unselected package sssd-common. 698s Preparing to unpack .../25-sssd-common_2.9.4-1.1ubuntu1_arm64.deb ... 698s Unpacking sssd-common (2.9.4-1.1ubuntu1) ... 698s Selecting previously unselected package libavahi-common-data:arm64. 698s Preparing to unpack .../26-libavahi-common-data_0.8-13ubuntu4_arm64.deb ... 698s Unpacking libavahi-common-data:arm64 (0.8-13ubuntu4) ... 698s Selecting previously unselected package libavahi-common3:arm64. 698s Preparing to unpack .../27-libavahi-common3_0.8-13ubuntu4_arm64.deb ... 698s Unpacking libavahi-common3:arm64 (0.8-13ubuntu4) ... 698s Selecting previously unselected package libavahi-client3:arm64. 698s Preparing to unpack .../28-libavahi-client3_0.8-13ubuntu4_arm64.deb ... 698s Unpacking libavahi-client3:arm64 (0.8-13ubuntu4) ... 699s Preparing to unpack .../29-libtirpc-common_1.3.4+ds-1.1_all.deb ... 699s Unpacking libtirpc-common (1.3.4+ds-1.1) over (1.3.4+ds-1build1) ... 699s dpkg: libtirpc3:arm64: dependency problems, but removing anyway as you requested: 699s lsof depends on libtirpc3 (>= 1.0.2). 699s libpython3.12-stdlib:arm64 depends on libtirpc3 (>= 1.0.2). 699s libnss-nisplus:arm64 depends on libtirpc3 (>= 1.0.2). 699s libnsl2:arm64 depends on libtirpc3 (>= 1.0.2). 699s iproute2 depends on libtirpc3 (>= 1.0.2). 699s 699s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74715 files and directories currently installed.) 699s Removing libtirpc3:arm64 (1.3.4+ds-1build1) ... 699s Selecting previously unselected package libtirpc3t64:arm64. 699s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74709 files and directories currently installed.) 699s Preparing to unpack .../00-libtirpc3t64_1.3.4+ds-1.1_arm64.deb ... 699s Adding 'diversion of /lib/aarch64-linux-gnu/libtirpc.so.3 to /lib/aarch64-linux-gnu/libtirpc.so.3.usr-is-merged by libtirpc3t64' 699s Adding 'diversion of /lib/aarch64-linux-gnu/libtirpc.so.3.0.0 to /lib/aarch64-linux-gnu/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' 699s Unpacking libtirpc3t64:arm64 (1.3.4+ds-1.1) ... 699s Selecting previously unselected package libwbclient0:arm64. 699s Preparing to unpack .../01-libwbclient0_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 699s Unpacking libwbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 699s Selecting previously unselected package samba-libs:arm64. 699s Preparing to unpack .../02-samba-libs_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 699s Unpacking samba-libs:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 699s Selecting previously unselected package sssd-ad-common. 699s Preparing to unpack .../03-sssd-ad-common_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-ad-common (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd-krb5-common. 699s Preparing to unpack .../04-sssd-krb5-common_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-krb5-common (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package libsmbclient0:arm64. 699s Preparing to unpack .../05-libsmbclient0_2%3a4.19.5+dfsg-4ubuntu2_arm64.deb ... 699s Unpacking libsmbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 699s Selecting previously unselected package sssd-ad. 699s Preparing to unpack .../06-sssd-ad_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-ad (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package libipa-hbac0t64. 699s Preparing to unpack .../07-libipa-hbac0t64_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking libipa-hbac0t64 (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd-ipa. 699s Preparing to unpack .../08-sssd-ipa_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-ipa (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd-krb5. 699s Preparing to unpack .../09-sssd-krb5_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-krb5 (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd-ldap. 699s Preparing to unpack .../10-sssd-ldap_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-ldap (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd-proxy. 699s Preparing to unpack .../11-sssd-proxy_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd-proxy (2.9.4-1.1ubuntu1) ... 699s Selecting previously unselected package sssd. 699s Preparing to unpack .../12-sssd_2.9.4-1.1ubuntu1_arm64.deb ... 699s Unpacking sssd (2.9.4-1.1ubuntu1) ... 699s Setting up libpwquality-common (1.4.5-3) ... 699s Setting up softhsm2-common (2.6.1-2.2build2) ... 700s 700s Creating config file /etc/softhsm/softhsm2.conf with new version 700s Setting up libnfsidmap1:arm64 (1:2.6.4-3ubuntu3) ... 700s Setting up libsss-idmap0 (2.9.4-1.1ubuntu1) ... 700s Setting up libbasicobjects0t64:arm64 (0.6.2-2.1) ... 700s Setting up libipa-hbac0t64 (2.9.4-1.1ubuntu1) ... 700s Setting up libref-array1t64:arm64 (0.6.2-2.1) ... 700s Setting up libtdb1:arm64 (1.4.10-1) ... 700s Setting up libtirpc-common (1.3.4+ds-1.1) ... 700s Setting up libcollection4t64:arm64 (0.6.2-2.1) ... 700s Setting up libc-ares2:arm64 (1.27.0-1) ... 700s Setting up libwbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 700s Setting up libtalloc2:arm64 (2.4.2-1build1) ... 700s Setting up libpath-utils1t64:arm64 (0.6.2-2.1) ... 700s Setting up libavahi-common-data:arm64 (0.8-13ubuntu4) ... 700s Setting up libdhash1t64:arm64 (0.6.2-2.1) ... 700s Setting up libcrack2:arm64 (2.9.6-5.1) ... 700s Setting up libsss-nss-idmap0 (2.9.4-1.1ubuntu1) ... 700s Setting up libini-config5t64:arm64 (0.6.2-2.1) ... 700s Setting up libtevent0t64:arm64 (0.16.1-2) ... 700s Setting up libnss-sss:arm64 (2.9.4-1.1ubuntu1) ... 700s Setting up libsofthsm2 (2.6.1-2.2build2) ... 700s Setting up softhsm2 (2.6.1-2.2build2) ... 700s Setting up libtirpc3t64:arm64 (1.3.4+ds-1.1) ... 700s Setting up libavahi-common3:arm64 (0.8-13ubuntu4) ... 700s Setting up libsss-certmap0 (2.9.4-1.1ubuntu1) ... 700s Setting up libpwquality1:arm64 (1.4.5-3) ... 700s Setting up libldb2:arm64 (2:2.8.0+samba4.19.5+dfsg-4ubuntu2) ... 700s Setting up libavahi-client3:arm64 (0.8-13ubuntu4) ... 700s Setting up libpam-pwquality:arm64 (1.4.5-3) ... 700s Setting up samba-libs:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 700s Setting up python3-sss (2.9.4-1.1ubuntu1) ... 700s Setting up libsmbclient0:arm64 (2:4.19.5+dfsg-4ubuntu2) ... 700s Setting up libpam-sss:arm64 (2.9.4-1.1ubuntu1) ... 700s Setting up sssd-common (2.9.4-1.1ubuntu1) ... 700s Creating SSSD system user & group... 700s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 700s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 700s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 700s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 701s Created symlink /etc/systemd/system/sssd.service.wants/sssd-autofs.socket → /usr/lib/systemd/system/sssd-autofs.socket. 701s Created symlink /etc/systemd/system/sssd.service.wants/sssd-nss.socket → /usr/lib/systemd/system/sssd-nss.socket. 701s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam-priv.socket → /usr/lib/systemd/system/sssd-pam-priv.socket. 702s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pam.socket → /usr/lib/systemd/system/sssd-pam.socket. 702s Created symlink /etc/systemd/system/sssd.service.wants/sssd-ssh.socket → /usr/lib/systemd/system/sssd-ssh.socket. 702s Created symlink /etc/systemd/system/sssd.service.wants/sssd-sudo.socket → /usr/lib/systemd/system/sssd-sudo.socket. 702s Created symlink /etc/systemd/system/multi-user.target.wants/sssd.service → /usr/lib/systemd/system/sssd.service. 703s sssd-autofs.service is a disabled or a static unit, not starting it. 703s sssd-nss.service is a disabled or a static unit, not starting it. 703s sssd-pam.service is a disabled or a static unit, not starting it. 703s sssd-ssh.service is a disabled or a static unit, not starting it. 703s sssd-sudo.service is a disabled or a static unit, not starting it. 703s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 703s Setting up sssd-proxy (2.9.4-1.1ubuntu1) ... 703s Setting up sssd-ad-common (2.9.4-1.1ubuntu1) ... 703s Created symlink /etc/systemd/system/sssd.service.wants/sssd-pac.socket → /usr/lib/systemd/system/sssd-pac.socket. 704s sssd-pac.service is a disabled or a static unit, not starting it. 704s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 704s Setting up sssd-krb5-common (2.9.4-1.1ubuntu1) ... 704s Setting up sssd-krb5 (2.9.4-1.1ubuntu1) ... 704s Setting up sssd-ldap (2.9.4-1.1ubuntu1) ... 704s Setting up sssd-ad (2.9.4-1.1ubuntu1) ... 704s Setting up sssd-ipa (2.9.4-1.1ubuntu1) ... 704s Setting up sssd (2.9.4-1.1ubuntu1) ... 704s Setting up autopkgtest-satdep (0) ... 704s Processing triggers for man-db (2.12.0-3) ... 705s Processing triggers for libc-bin (2.39-0ubuntu2) ... 710s (Reading database ... 74946 files and directories currently installed.) 710s Removing autopkgtest-satdep (0) ... 721s autopkgtest [13:47:16]: test sssd-softhism2-certificates-tests.sh: [----------------------- 721s + '[' -z ubuntu ']' 721s + required_tools=(p11tool openssl softhsm2-util) 721s + for cmd in "${required_tools[@]}" 721s + command -v p11tool 721s + for cmd in "${required_tools[@]}" 721s + command -v openssl 721s + for cmd in "${required_tools[@]}" 721s + command -v softhsm2-util 721s + PIN=053350 721s +++ find /usr/lib/softhsm/libsofthsm2.so 721s +++ head -n 1 721s ++ realpath /usr/lib/softhsm/libsofthsm2.so 721s + SOFTHSM2_MODULE=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 721s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 721s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 721s + '[' '!' -v NO_SSSD_TESTS ']' 721s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 721s + ca_db_arg=ca_db 721s ++ /usr/libexec/sssd/p11_child --help 721s + p11_child_help='Usage: p11_child [OPTION...] 721s -d, --debug-level=INT Debug level 721s --debug-timestamps=INT Add debug timestamps 721s --debug-microseconds=INT Show timestamps with microseconds 721s --dumpable=INT Allow core dumps 721s --debug-fd=INT An open file descriptor for the debug 721s logs 721s --logger=stderr|files|journald Set logger 721s --auth Run in auth mode 721s --pre Run in pre-auth mode 721s --wait_for_card Wait until card is available 721s --verification Run in verification mode 721s --pin Expect PIN on stdin 721s --keypad Expect PIN on keypad 721s --verify=STRING Tune validation 721s --ca_db=STRING CA DB to use 721s --module_name=STRING Module name for authentication 721s --token_name=STRING Token name for authentication 721s --key_id=STRING Key ID for authentication 721s --label=STRING Label for authentication 721s --certificate=STRING certificate to verify, base64 encoded 721s --uri=STRING PKCS#11 URI to restrict selection 721s --chain-id=LONG Tevent chain ID used for logging 721s purposes 721s 721s Help options: 721s -?, --help Show this help message 721s --usage Display brief usage message' 721s + echo 'Usage: p11_child [OPTION...] 721s -d, --debug-level=INT Debug level 721s --debug-timestamps=INT Add debug timestamps 721s --debug-microseconds=INT Show timestamps with microseconds 721s --dumpable=INT Allow core dumps 721s --debug-fd=INT An open file descriptor for the debug 721s logs 721s --logger=stderr|files|journald Set logger 721s --auth Run in auth mode 721s --pre Run in pre-auth mode 721s --wait_for_card Wait until card is available 721s --verification Run in verification mode 721s --pin Expect PIN on stdin 721s --keypad Expect PIN on keypad 721s --verify=STRING Tune validation 721s --ca_db=STRING CA DB to use 721s --module_name=STRING Module name for authentication 721s --token_name=STRING Token name for authentication 721s --key_id=STRING Key ID for authentication 721s --label=STRING Label for authentication 721s --certificate=STRING certificate to verify, base64 encoded 721s --uri=STRING PKCS#11 URI to restrict selection 721s --chain-id=LONG Tevent chain ID used for logging 721s purposes 721s 721s Help options: 721s -?, --help Show this help message 721s --usage Display brief usage message' 721s + grep nssdb -qs 721s + echo 'Usage: p11_child [OPTION...] 721s -d, --debug-level=INT Debug level 721s --debug-timestamps=INT Add debug timestamps 721s --debug-microseconds=INT Show timestamps with microseconds 721s --dumpable=INT Allow core dumps 721s --debug-fd=INT An open file descriptor for the debug 721s logs 721s --logger=stderr|files|journald Set logger 721s --auth Run in auth mode 721s --pre Run in pre-auth mode 721s --wait_for_card Wait until card is available 721s --verification Run in verification mode 721s --pin Expect PIN on stdin 721s --keypad Expect PIN on keypad 721s --verify=STRING Tune validation 721s --ca_db=STRING CA DB to use 721s --module_name=STRING Module name for authentication 721s --token_name=STRING Token name for authentication 721s --key_id=STRING Key ID for authentication 721s --label=STRING Label for authentication 721s --certificate=STRING certificate to verify, base64 encoded 721s --uri=STRING PKCS#11 URI to restrict selection 721s --chain-id=LONG Tevent chain ID used for logging 721s purposes 721s 721s Help options: 721s -?, --help Show this help message 721s --usage Display brief usage message' 721s + grep -qs -- --ca_db 721s + '[' '!' -e /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so ']' 721s ++ mktemp -d -t sssd-softhsm2-XXXXXX 721s + tmpdir=/tmp/sssd-softhsm2-rLk9i3 721s + keys_size=1024 721s + [[ ! -v KEEP_TEMPORARY_FILES ]] 721s + trap 'rm -rf "$tmpdir"' EXIT 721s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 721s + echo -n 01 721s + touch /tmp/sssd-softhsm2-rLk9i3/index.txt 721s + mkdir -p /tmp/sssd-softhsm2-rLk9i3/new_certs 721s + cat 721s + root_ca_key_pass=pass:random-root-CA-password-16310 721s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA-key.pem -passout pass:random-root-CA-password-16310 1024 722s + openssl req -passin pass:random-root-CA-password-16310 -batch -config /tmp/sssd-softhsm2-rLk9i3/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-rLk9i3/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 722s + cat 722s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-4956 722s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-4956 1024 722s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-4956 -config /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.config -key /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-16310 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-certificate-request.pem 722s + openssl req -text -noout -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-certificate-request.pem 722s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rLk9i3/test-root-CA.config -passin pass:random-root-CA-password-16310 -keyfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA-key.pem -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 722s Certificate Request: 722s Data: 722s Version: 1 (0x0) 722s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 722s Subject Public Key Info: 722s Public Key Algorithm: rsaEncryption 722s Public-Key: (1024 bit) 722s Modulus: 722s 00:df:f6:b1:0a:bd:c3:07:3d:b2:44:10:65:f2:a7: 722s 1b:69:b9:dc:14:cc:e7:92:d8:c4:6d:04:25:6c:c4: 722s 84:ae:94:da:be:54:76:66:50:2d:65:ab:aa:bb:cb: 722s 7f:6e:2a:0d:c8:19:d6:3d:30:80:1e:91:77:c0:8c: 722s e9:b3:fd:bb:29:7b:dc:1b:4d:c5:61:ae:e2:53:9c: 722s 1e:ff:a5:1a:e8:8d:de:54:25:03:a1:e3:18:34:69: 722s 6d:aa:c0:87:60:3f:bf:f9:27:0d:92:d4:a0:99:1c: 722s 4a:7e:8b:bf:ce:1f:b9:eb:b6:a3:d1:68:78:45:86: 722s d9:9e:39:77:22:27:3a:a9:8f 722s Exponent: 65537 (0x10001) 722s Attributes: 722s (none) 722s Requested Extensions: 722s Signature Algorithm: sha256WithRSAEncryption 722s Signature Value: 722s 33:0a:5d:d4:11:df:54:c3:b3:64:4b:e7:2c:24:c2:b2:1a:23: 722s ba:b3:84:c2:80:2b:2e:11:68:6a:5d:75:f1:5f:a9:93:21:69: 722s ff:fd:05:ae:a6:25:8e:3f:73:1f:86:67:bd:fc:15:4a:7b:19: 722s 1f:53:ab:02:4e:9d:45:73:f9:44:90:fc:f7:1f:d0:1f:6d:ed: 722s 30:be:fe:b0:77:86:18:4a:a2:9b:57:89:3f:12:ba:35:2f:fe: 722s c0:3d:ed:d3:63:55:d1:12:a9:8f:20:01:06:18:28:2c:0e:e1: 722s e1:b1:61:7d:a6:b5:69:23:e9:6b:cd:7d:07:c3:a2:4c:b5:3c: 722s d1:93 722s Using configuration from /tmp/sssd-softhsm2-rLk9i3/test-root-CA.config 722s Check that the request matches the signature 722s Signature ok 722s Certificate Details: 722s Serial Number: 1 (0x1) 722s Validity 722s Not Before: Mar 12 13:47:17 2024 GMT 722s Not After : Mar 12 13:47:17 2025 GMT 722s Subject: 722s organizationName = Test Organization 722s organizationalUnitName = Test Organization Unit 722s commonName = Test Organization Intermediate CA 722s X509v3 extensions: 722s X509v3 Subject Key Identifier: 722s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 722s X509v3 Authority Key Identifier: 722s keyid:14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 722s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 722s serial:00 722s X509v3 Basic Constraints: 722s CA:TRUE 722s X509v3 Key Usage: critical 722s Digital Signature, Certificate Sign, CRL Sign 722s Certificate is to be certified until Mar 12 13:47:17 2025 GMT (365 days) 722s 722s Write out database with 1 new entries 722s Database updated 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem: OK 722s + cat 722s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-16151 722s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-16151 1024 722s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-16151 -config /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-4956 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-certificate-request.pem 722s + openssl req -text -noout -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-certificate-request.pem 722s Certificate Request: 722s Data: 722s Version: 1 (0x0) 722s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 722s Subject Public Key Info: 722s Public Key Algorithm: rsaEncryption 722s Public-Key: (1024 bit) 722s Modulus: 722s 00:cc:b7:a5:32:00:9a:36:75:8d:56:ee:4a:91:90: 722s fa:30:27:be:a8:0a:1c:a9:14:db:9f:49:65:46:df: 722s 74:a7:94:e3:02:96:27:f4:1f:e1:0d:4e:99:80:05: 722s e5:95:e3:87:b8:b4:3e:fc:b8:bd:2c:1e:ed:d0:d9: 722s fc:08:2e:64:27:f3:16:26:92:00:21:63:89:62:3d: 722s 16:7b:2d:d1:59:21:f9:1b:09:7b:45:66:4c:fd:74: 722s 4c:51:80:6d:da:bd:44:40:19:d6:30:3a:f5:87:01: 722s 76:c7:dc:08:1b:b9:2f:d8:50:98:d6:6c:9b:35:34: 722s 15:0e:b8:78:4c:40:10:43:11 722s Exponent: 65537 (0x10001) 722s Attributes: 722s (none) 722s Requested Extensions: 722s Signature Algorithm: sha256WithRSAEncryption 722s Signature Value: 722s 29:ec:d7:67:5b:c0:26:8e:20:a4:5e:98:56:43:87:50:a6:52: 722s 05:9a:9a:05:a0:08:bc:d5:ee:d6:df:da:c7:33:4d:1a:f0:d8: 722s 04:ab:68:2e:e5:b2:3d:38:36:6b:59:90:c3:d8:06:11:66:38: 722s 99:57:14:a3:72:be:bd:65:19:d1:77:fe:96:b2:ab:d6:d0:5e: 722s 20:96:3b:d0:c4:20:5a:59:7c:cd:e3:81:8c:53:30:45:ef:87: 722s 27:e9:ec:e6:cc:92:2e:ec:c5:1b:d2:79:27:56:0e:77:d8:a8: 722s af:2b:ba:06:db:43:60:12:00:db:8c:02:a6:7f:05:39:96:a2: 722s 11:66 722s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-4956 -keyfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s Using configuration from /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.config 722s Check that the request matches the signature 722s Signature ok 722s Certificate Details: 722s Serial Number: 2 (0x2) 722s Validity 722s Not Before: Mar 12 13:47:17 2024 GMT 722s Not After : Mar 12 13:47:17 2025 GMT 722s Subject: 722s organizationName = Test Organization 722s organizationalUnitName = Test Organization Unit 722s commonName = Test Organization Sub Intermediate CA 722s X509v3 extensions: 722s X509v3 Subject Key Identifier: 722s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 722s X509v3 Authority Key Identifier: 722s keyid:DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 722s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 722s serial:01 722s X509v3 Basic Constraints: 722s CA:TRUE 722s X509v3 Key Usage: critical 722s Digital Signature, Certificate Sign, CRL Sign 722s Certificate is to be certified until Mar 12 13:47:17 2025 GMT (365 days) 722s 722s Write out database with 1 new entries 722s Database updated 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem: OK 722s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 722s error 20 at 0 depth lookup: unable to get local issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem: verification failed 722s + cat 722s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-19948 722s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-19948 1024 722s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-19948 -key /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-request.pem 722s + openssl req -text -noout -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-request.pem 722s Certificate Request: 722s Data: 722s Version: 1 (0x0) 722s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 722s Subject Public Key Info: 722s Public Key Algorithm: rsaEncryption 722s Public-Key: (1024 bit) 722s Modulus: 722s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 722s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 722s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 722s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 722s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 722s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 722s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 722s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 722s 1a:27:d0:bb:97:23:95:9a:09 722s Exponent: 65537 (0x10001) 722s Attributes: 722s Requested Extensions: 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Root CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Signature Algorithm: sha256WithRSAEncryption 722s Signature Value: 722s 9f:08:45:a1:91:df:bb:51:08:17:12:28:43:29:b0:cf:1d:c9: 722s 94:1c:3a:36:58:e6:cb:e9:f8:d3:fa:fe:5d:d2:75:ad:40:48: 722s 57:c9:ff:f2:8f:d2:33:9c:98:e9:bc:35:96:1a:c0:a3:02:dd: 722s c3:68:47:26:ad:84:97:2f:a2:ac:50:f6:79:e3:b7:47:64:ce: 722s 92:42:4f:d0:63:ca:58:8f:86:04:ec:3a:1b:c3:34:8c:2b:41: 722s 2e:45:ff:c9:2f:29:13:30:aa:8e:c7:9b:2e:3b:82:90:02:37: 722s 1d:95:a8:5b:0e:67:2d:bf:55:3f:c8:a4:be:5e:ad:6b:78:30: 722s 52:08 722s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-rLk9i3/test-root-CA.config -passin pass:random-root-CA-password-16310 -keyfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA-key.pem -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s Using configuration from /tmp/sssd-softhsm2-rLk9i3/test-root-CA.config 722s Check that the request matches the signature 722s Signature ok 722s Certificate Details: 722s Serial Number: 3 (0x3) 722s Validity 722s Not Before: Mar 12 13:47:17 2024 GMT 722s Not After : Mar 12 13:47:17 2025 GMT 722s Subject: 722s organizationName = Test Organization 722s organizationalUnitName = Test Organization Unit 722s commonName = Test Organization Root Trusted Certificate 0001 722s X509v3 extensions: 722s X509v3 Authority Key Identifier: 722s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Root CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Certificate is to be certified until Mar 12 13:47:17 2025 GMT (365 days) 722s 722s Write out database with 1 new entries 722s Database updated 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem: OK 722s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 722s error 20 at 0 depth lookup: unable to get local issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem: verification failed 722s + cat 722s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 722s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-3415 1024 722s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-3415 -key /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-request.pem 722s + openssl req -text -noout -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-request.pem 722s Certificate Request: 722s Data: 722s Version: 1 (0x0) 722s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 722s Subject Public Key Info: 722s Public Key Algorithm: rsaEncryption 722s Public-Key: (1024 bit) 722s Modulus: 722s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 722s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 722s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 722s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 722s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 722s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 722s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 722s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 722s 64:67:5a:75:e2:c7:97:61:2f 722s Exponent: 65537 (0x10001) 722s Attributes: 722s Requested Extensions: 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Intermediate CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Signature Algorithm: sha256WithRSAEncryption 722s Signature Value: 722s 35:1e:f0:e4:4a:6b:8d:40:7a:04:4d:ff:05:49:f3:d4:3c:79: 722s e5:cb:21:b1:a6:dd:68:42:9a:94:d3:6a:68:3c:cb:d9:fd:df: 722s 68:ad:74:14:b6:b8:20:72:c9:60:4a:11:81:ea:d5:ba:97:3a: 722s aa:e3:51:17:e9:43:40:5f:47:82:68:cb:a6:72:ff:c9:21:cf: 722s 1b:8a:fc:89:69:bf:b7:eb:e2:6e:7c:69:9a:e2:2b:98:86:4d: 722s cf:b7:0b:06:7d:5e:30:d8:9c:98:c7:81:28:ab:4f:4e:ee:45: 722s 88:b7:d1:41:a4:35:1d:cb:a8:ba:54:dc:02:4d:47:d6:a3:0b: 722s 09:cd 722s + openssl ca -passin pass:random-intermediate-CA-password-4956 -config /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s Using configuration from /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.config 722s Check that the request matches the signature 722s Signature ok 722s Certificate Details: 722s Serial Number: 4 (0x4) 722s Validity 722s Not Before: Mar 12 13:47:17 2024 GMT 722s Not After : Mar 12 13:47:17 2025 GMT 722s Subject: 722s organizationName = Test Organization 722s organizationalUnitName = Test Organization Unit 722s commonName = Test Organization Intermediate Trusted Certificate 0001 722s X509v3 extensions: 722s X509v3 Authority Key Identifier: 722s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Intermediate CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Certificate is to be certified until Mar 12 13:47:17 2025 GMT (365 days) 722s 722s Write out database with 1 new entries 722s Database updated 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s + echo 'This certificate should not be trusted fully' 722s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s This certificate should not be trusted fully 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 722s error 2 at 1 depth lookup: unable to get issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 722s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem: OK 722s + cat 722s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 722s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-7118 1024 722s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-7118 -key /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 722s + openssl req -text -noout -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 722s Certificate Request: 722s Data: 722s Version: 1 (0x0) 722s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 722s Subject Public Key Info: 722s Public Key Algorithm: rsaEncryption 722s Public-Key: (1024 bit) 722s Modulus: 722s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 722s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 722s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 722s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 722s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 722s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 722s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 722s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 722s 12:31:0b:a5:cd:dd:94:2a:dd 722s Exponent: 65537 (0x10001) 722s Attributes: 722s Requested Extensions: 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Sub Intermediate CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Signature Algorithm: sha256WithRSAEncryption 722s Signature Value: 722s 2d:18:ec:cd:49:ff:d7:91:71:e3:52:2e:96:c8:e5:c0:34:14: 722s 16:85:c4:83:32:21:11:a0:f1:66:b1:43:a2:67:4d:48:cd:6f: 722s a3:73:d9:75:42:4d:a3:93:6f:4f:3e:9c:23:a2:73:7b:43:ff: 722s a0:85:b1:61:61:5b:33:89:e1:07:8c:ac:af:b8:7f:29:5d:2f: 722s b7:e3:63:45:b7:b6:5f:01:61:94:b7:ed:c4:60:73:05:cb:b2: 722s dd:8e:7b:68:d5:0b:6c:db:99:9f:10:5a:91:4b:40:fd:75:d4: 722s 71:9e:8b:04:6d:bc:f6:5a:b2:bd:17:e0:59:6d:86:0e:83:ba: 722s 5c:98 722s + openssl ca -passin pass:random-sub-intermediate-CA-password-16151 -config /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s Using configuration from /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.config 722s Check that the request matches the signature 722s Signature ok 722s Certificate Details: 722s Serial Number: 5 (0x5) 722s Validity 722s Not Before: Mar 12 13:47:17 2024 GMT 722s Not After : Mar 12 13:47:17 2025 GMT 722s Subject: 722s organizationName = Test Organization 722s organizationalUnitName = Test Organization Unit 722s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 722s X509v3 extensions: 722s X509v3 Authority Key Identifier: 722s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 722s X509v3 Basic Constraints: 722s CA:FALSE 722s Netscape Cert Type: 722s SSL Client, S/MIME 722s Netscape Comment: 722s Test Organization Sub Intermediate CA trusted Certificate 722s X509v3 Subject Key Identifier: 722s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 722s X509v3 Key Usage: critical 722s Digital Signature, Non Repudiation, Key Encipherment 722s X509v3 Extended Key Usage: 722s TLS Web Client Authentication, E-mail Protection 722s X509v3 Subject Alternative Name: 722s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 722s Certificate is to be certified until Mar 12 13:47:17 2025 GMT (365 days) 722s 722s Write out database with 1 new entries 722s Database updated 722s + openssl x509 -noout -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s + echo 'This certificate should not be trusted fully' 722s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s This certificate should not be trusted fully 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 722s error 2 at 1 depth lookup: unable to get issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 722s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 722s error 20 at 0 depth lookup: unable to get local issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 722s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 722s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s + local cmd=openssl 722s + shift 722s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 722s error 20 at 0 depth lookup: unable to get local issuer certificate 722s error /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 722s Building a the full-chain CA file... 722s + echo 'Building a the full-chain CA file...' 722s + cat /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s + cat /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 722s + cat /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 722s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 722s + openssl pkcs7 -print_certs -noout 722s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 722s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 722s 722s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 722s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 722s 722s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 722s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 722s 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem: OK 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem: OK 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem: OK 722s /tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem: OK 722s + openssl verify -CAfile /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 722s /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 722s + echo 'Certificates generation completed!' 722s + [[ -v NO_SSSD_TESTS ]] 722s Certificates generation completed! 722s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /dev/null 722s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /dev/null 722s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 722s + local key_ring=/dev/null 722s + local verify_option= 722s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 722s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 722s + local key_cn 722s + local key_name 722s + local tokens_dir 722s + local output_cert_file 722s + token_name= 722s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 722s + key_name=test-root-CA-trusted-certificate-0001 722s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 722s ++ sed -n 's/ *commonName *= //p' 722s + key_cn='Test Organization Root Trusted Certificate 0001' 722s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 722s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 722s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 722s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 722s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 722s + token_name='Test Organization Root Tr Token' 722s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 722s + local key_file 722s + local decrypted_key 722s + mkdir -p /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 723s + key_file=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key.pem 723s + decrypted_key=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key-decrypted.pem 723s + cat 723s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 723s Slot 0 has a free/uninitialized token. 723s The token has been initialized and is reassigned to slot 1205991405 723s + softhsm2-util --show-slots 723s Available slots: 723s Slot 1205991405 723s Slot info: 723s Description: SoftHSM slot ID 0x47e1f7ed 723s Manufacturer ID: SoftHSM project 723s Hardware version: 2.6 723s Firmware version: 2.6 723s Token present: yes 723s Token info: 723s Manufacturer ID: SoftHSM project 723s Model: SoftHSM v2 723s Hardware version: 2.6 723s Firmware version: 2.6 723s Serial number: fb744148c7e1f7ed 723s Initialized: yes 723s User PIN init.: yes 723s Label: Test Organization Root Tr Token 723s Slot 1 723s Slot info: 723s Description: SoftHSM slot ID 0x1 723s Manufacturer ID: SoftHSM project 723s Hardware version: 2.6 723s Firmware version: 2.6 723s Token present: yes 723s Token info: 723s Manufacturer ID: SoftHSM project 723s Model: SoftHSM v2 723s Hardware version: 2.6 723s Firmware version: 2.6 723s Serial number: 723s Initialized: no 723s User PIN init.: no 723s Label: 723s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 723s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-19948 -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key-decrypted.pem 723s writing RSA key 723s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 723s + rm /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001-key-decrypted.pem 723s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 723s Object 0: 723s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 723s Type: X.509 Certificate (RSA-1024) 723s Expires: Wed Mar 12 13:47:17 2025 723s Label: Test Organization Root Trusted Certificate 0001 723s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 723s 723s Test Organization Root Tr Token 723s + echo 'Test Organization Root Tr Token' 723s + '[' -n '' ']' 723s + local output_base_name=SSSD-child-17707 723s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17707.output 723s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17707.pem 723s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 723s [p11_child[2132]] [main] (0x0400): p11_child started. 723s [p11_child[2132]] [main] (0x2000): Running in [pre-auth] mode. 723s [p11_child[2132]] [main] (0x2000): Running with effective IDs: [0][0]. 723s [p11_child[2132]] [main] (0x2000): Running with real IDs [0][0]. 723s [p11_child[2132]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 723s [p11_child[2132]] [do_work] (0x0040): init_verification failed. 723s [p11_child[2132]] [main] (0x0020): p11_child failed (5) 723s + return 2 723s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /dev/null no_verification 723s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /dev/null no_verification 723s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 723s + local key_ring=/dev/null 723s + local verify_option=no_verification 723s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 723s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 723s + local key_cn 723s + local key_name 723s + local tokens_dir 723s + local output_cert_file 723s + token_name= 723s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 723s + key_name=test-root-CA-trusted-certificate-0001 723s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s ++ sed -n 's/ *commonName *= //p' 723s + key_cn='Test Organization Root Trusted Certificate 0001' 723s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 723s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 723s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 723s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 723s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 723s + token_name='Test Organization Root Tr Token' 723s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 723s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 723s + echo 'Test Organization Root Tr Token' 723s Test Organization Root Tr Token 723s + '[' -n no_verification ']' 723s + local verify_arg=--verify=no_verification 723s + local output_base_name=SSSD-child-6203 723s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.output 723s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.pem 723s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 723s [p11_child[2138]] [main] (0x0400): p11_child started. 723s [p11_child[2138]] [main] (0x2000): Running in [pre-auth] mode. 723s [p11_child[2138]] [main] (0x2000): Running with effective IDs: [0][0]. 723s [p11_child[2138]] [main] (0x2000): Running with real IDs [0][0]. 723s [p11_child[2138]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 723s [p11_child[2138]] [do_card] (0x4000): Module List: 723s [p11_child[2138]] [do_card] (0x4000): common name: [softhsm2]. 723s [p11_child[2138]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2138]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 723s [p11_child[2138]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 723s [p11_child[2138]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2138]] [do_card] (0x4000): Login NOT required. 723s [p11_child[2138]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 723s [p11_child[2138]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 723s [p11_child[2138]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 723s [p11_child[2138]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 723s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.output 723s + echo '-----BEGIN CERTIFICATE-----' 723s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.output 723s + echo '-----END CERTIFICATE-----' 723s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.pem 723s Certificate: 723s Data: 723s Version: 3 (0x2) 723s Serial Number: 3 (0x3) 723s Signature Algorithm: sha256WithRSAEncryption 723s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 723s Validity 723s Not Before: Mar 12 13:47:17 2024 GMT 723s Not After : Mar 12 13:47:17 2025 GMT 723s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 723s Subject Public Key Info: 723s Public Key Algorithm: rsaEncryption 723s Public-Key: (1024 bit) 723s Modulus: 723s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 723s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 723s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 723s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 723s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 723s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 723s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 723s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 723s 1a:27:d0:bb:97:23:95:9a:09 723s Exponent: 65537 (0x10001) 723s X509v3 extensions: 723s X509v3 Authority Key Identifier: 723s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 723s X509v3 Basic Constraints: 723s CA:FALSE 723s Netscape Cert Type: 723s SSL Client, S/MIME 723s Netscape Comment: 723s Test Organization Root CA trusted Certificate 723s X509v3 Subject Key Identifier: 723s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 723s X509v3 Key Usage: critical 723s Digital Signature, Non Repudiation, Key Encipherment 723s X509v3 Extended Key Usage: 723s TLS Web Client Authentication, E-mail Protection 723s X509v3 Subject Alternative Name: 723s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 723s Signature Algorithm: sha256WithRSAEncryption 723s Signature Value: 723s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 723s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 723s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 723s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 723s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 723s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 723s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 723s cc:22 723s + local found_md5 expected_md5 723s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s + expected_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 723s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203.pem 723s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 723s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 723s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.output 723s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.output .output 723s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.pem 723s + echo -n 053350 723s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 723s [p11_child[2146]] [main] (0x0400): p11_child started. 723s [p11_child[2146]] [main] (0x2000): Running in [auth] mode. 723s [p11_child[2146]] [main] (0x2000): Running with effective IDs: [0][0]. 723s [p11_child[2146]] [main] (0x2000): Running with real IDs [0][0]. 723s [p11_child[2146]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 723s [p11_child[2146]] [do_card] (0x4000): Module List: 723s [p11_child[2146]] [do_card] (0x4000): common name: [softhsm2]. 723s [p11_child[2146]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2146]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 723s [p11_child[2146]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 723s [p11_child[2146]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2146]] [do_card] (0x4000): Login required. 723s [p11_child[2146]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 723s [p11_child[2146]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 723s [p11_child[2146]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 723s [p11_child[2146]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 723s [p11_child[2146]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 723s [p11_child[2146]] [do_card] (0x4000): Certificate verified and validated. 723s [p11_child[2146]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 723s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.output 723s + echo '-----BEGIN CERTIFICATE-----' 723s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.output 723s + echo '-----END CERTIFICATE-----' 723s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.pem 723s Certificate: 723s Data: 723s Version: 3 (0x2) 723s Serial Number: 3 (0x3) 723s Signature Algorithm: sha256WithRSAEncryption 723s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 723s Validity 723s Not Before: Mar 12 13:47:17 2024 GMT 723s Not After : Mar 12 13:47:17 2025 GMT 723s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 723s Subject Public Key Info: 723s Public Key Algorithm: rsaEncryption 723s Public-Key: (1024 bit) 723s Modulus: 723s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 723s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 723s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 723s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 723s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 723s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 723s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 723s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 723s 1a:27:d0:bb:97:23:95:9a:09 723s Exponent: 65537 (0x10001) 723s X509v3 extensions: 723s X509v3 Authority Key Identifier: 723s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 723s X509v3 Basic Constraints: 723s CA:FALSE 723s Netscape Cert Type: 723s SSL Client, S/MIME 723s Netscape Comment: 723s Test Organization Root CA trusted Certificate 723s X509v3 Subject Key Identifier: 723s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 723s X509v3 Key Usage: critical 723s Digital Signature, Non Repudiation, Key Encipherment 723s X509v3 Extended Key Usage: 723s TLS Web Client Authentication, E-mail Protection 723s X509v3 Subject Alternative Name: 723s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 723s Signature Algorithm: sha256WithRSAEncryption 723s Signature Value: 723s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 723s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 723s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 723s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 723s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 723s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 723s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 723s cc:22 723s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-6203-auth.pem 723s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 723s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 723s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 723s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 723s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 723s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 723s + local verify_option= 723s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 723s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 723s + local key_cn 723s + local key_name 723s + local tokens_dir 723s + local output_cert_file 723s + token_name= 723s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 723s + key_name=test-root-CA-trusted-certificate-0001 723s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 723s ++ sed -n 's/ *commonName *= //p' 723s + key_cn='Test Organization Root Trusted Certificate 0001' 723s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 723s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 723s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 723s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 723s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 723s + token_name='Test Organization Root Tr Token' 723s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 723s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 723s + echo 'Test Organization Root Tr Token' 723s Test Organization Root Tr Token 723s + '[' -n '' ']' 723s + local output_base_name=SSSD-child-7544 723s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.output 723s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.pem 723s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 723s [p11_child[2156]] [main] (0x0400): p11_child started. 723s [p11_child[2156]] [main] (0x2000): Running in [pre-auth] mode. 723s [p11_child[2156]] [main] (0x2000): Running with effective IDs: [0][0]. 723s [p11_child[2156]] [main] (0x2000): Running with real IDs [0][0]. 723s [p11_child[2156]] [do_card] (0x4000): Module List: 723s [p11_child[2156]] [do_card] (0x4000): common name: [softhsm2]. 723s [p11_child[2156]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2156]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 723s [p11_child[2156]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 723s [p11_child[2156]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 723s [p11_child[2156]] [do_card] (0x4000): Login NOT required. 723s [p11_child[2156]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 723s [p11_child[2156]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 723s [p11_child[2156]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 723s [p11_child[2156]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 723s [p11_child[2156]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 723s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.output 723s + echo '-----BEGIN CERTIFICATE-----' 723s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.output 723s + echo '-----END CERTIFICATE-----' 723s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.pem 723s + local found_md5 expected_md5 723s Certificate: 723s Data: 723s Version: 3 (0x2) 723s Serial Number: 3 (0x3) 723s Signature Algorithm: sha256WithRSAEncryption 723s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 723s Validity 723s Not Before: Mar 12 13:47:17 2024 GMT 723s Not After : Mar 12 13:47:17 2025 GMT 723s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 723s Subject Public Key Info: 723s Public Key Algorithm: rsaEncryption 723s Public-Key: (1024 bit) 723s Modulus: 723s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 723s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 723s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 723s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 723s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 723s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 723s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 723s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 723s 1a:27:d0:bb:97:23:95:9a:09 723s Exponent: 65537 (0x10001) 723s X509v3 extensions: 723s X509v3 Authority Key Identifier: 723s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 723s X509v3 Basic Constraints: 723s CA:FALSE 723s Netscape Cert Type: 723s SSL Client, S/MIME 723s Netscape Comment: 723s Test Organization Root CA trusted Certificate 723s X509v3 Subject Key Identifier: 723s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 723s X509v3 Key Usage: critical 723s Digital Signature, Non Repudiation, Key Encipherment 723s X509v3 Extended Key Usage: 723s TLS Web Client Authentication, E-mail Protection 723s X509v3 Subject Alternative Name: 723s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 723s Signature Algorithm: sha256WithRSAEncryption 723s Signature Value: 723s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 723s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 723s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 723s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 723s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 723s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 723s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 723s cc:22 723s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + expected_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.output 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.output .output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.pem 724s + echo -n 053350 724s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 724s [p11_child[2164]] [main] (0x0400): p11_child started. 724s [p11_child[2164]] [main] (0x2000): Running in [auth] mode. 724s [p11_child[2164]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2164]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2164]] [do_card] (0x4000): Module List: 724s [p11_child[2164]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2164]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2164]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2164]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2164]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2164]] [do_card] (0x4000): Login required. 724s [p11_child[2164]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2164]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2164]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2164]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 724s [p11_child[2164]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 724s [p11_child[2164]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 724s [p11_child[2164]] [do_card] (0x4000): Certificate verified and validated. 724s [p11_child[2164]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.pem 724s Certificate: 724s Data: 724s Version: 3 (0x2) 724s Serial Number: 3 (0x3) 724s Signature Algorithm: sha256WithRSAEncryption 724s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 724s Validity 724s Not Before: Mar 12 13:47:17 2024 GMT 724s Not After : Mar 12 13:47:17 2025 GMT 724s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 724s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 724s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 724s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 724s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 724s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 724s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 724s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 724s 1a:27:d0:bb:97:23:95:9a:09 724s Exponent: 65537 (0x10001) 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 724s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 724s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 724s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 724s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 724s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 724s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 724s cc:22 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-7544-auth.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 724s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 724s + local verify_option=partial_chain 724s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_cn 724s + local key_name 724s + local tokens_dir 724s + local output_cert_file 724s + token_name= 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 724s + key_name=test-root-CA-trusted-certificate-0001 724s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s ++ sed -n 's/ *commonName *= //p' 724s + key_cn='Test Organization Root Trusted Certificate 0001' 724s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 724s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 724s Test Organization Root Tr Token 724s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 724s + token_name='Test Organization Root Tr Token' 724s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 724s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 724s + echo 'Test Organization Root Tr Token' 724s + '[' -n partial_chain ']' 724s + local verify_arg=--verify=partial_chain 724s + local output_base_name=SSSD-child-31595 724s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.pem 724s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 724s [p11_child[2174]] [main] (0x0400): p11_child started. 724s [p11_child[2174]] [main] (0x2000): Running in [pre-auth] mode. 724s [p11_child[2174]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2174]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2174]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 724s [p11_child[2174]] [do_card] (0x4000): Module List: 724s [p11_child[2174]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2174]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2174]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2174]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2174]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2174]] [do_card] (0x4000): Login NOT required. 724s [p11_child[2174]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2174]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2174]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2174]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2174]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.pem 724s Certificate: 724s Data: 724s Version: 3 (0x2) 724s Serial Number: 3 (0x3) 724s Signature Algorithm: sha256WithRSAEncryption 724s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 724s Validity 724s Not Before: Mar 12 13:47:17 2024 GMT 724s Not After : Mar 12 13:47:17 2025 GMT 724s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 724s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 724s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 724s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 724s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 724s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 724s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 724s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 724s 1a:27:d0:bb:97:23:95:9a:09 724s Exponent: 65537 (0x10001) 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 724s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 724s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 724s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 724s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 724s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 724s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 724s cc:22 724s + local found_md5 expected_md5 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + expected_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.output 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.output .output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.pem 724s + echo -n 053350 724s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 724s [p11_child[2182]] [main] (0x0400): p11_child started. 724s [p11_child[2182]] [main] (0x2000): Running in [auth] mode. 724s [p11_child[2182]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2182]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2182]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 724s [p11_child[2182]] [do_card] (0x4000): Module List: 724s [p11_child[2182]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2182]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2182]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2182]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2182]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2182]] [do_card] (0x4000): Login required. 724s [p11_child[2182]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2182]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2182]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2182]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 724s [p11_child[2182]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 724s [p11_child[2182]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 724s [p11_child[2182]] [do_card] (0x4000): Certificate verified and validated. 724s [p11_child[2182]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.pem 724s Certificate: 724s Data: 724s Version: 3 (0x2) 724s Serial Number: 3 (0x3) 724s Signature Algorithm: sha256WithRSAEncryption 724s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 724s Validity 724s Not Before: Mar 12 13:47:17 2024 GMT 724s Not After : Mar 12 13:47:17 2025 GMT 724s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 724s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 724s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 724s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 724s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 724s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 724s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 724s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 724s 1a:27:d0:bb:97:23:95:9a:09 724s Exponent: 65537 (0x10001) 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 724s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 724s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 724s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 724s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 724s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 724s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 724s cc:22 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31595-auth.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s + local verify_option= 724s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_cn 724s + local key_name 724s + local tokens_dir 724s + local output_cert_file 724s + token_name= 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 724s + key_name=test-root-CA-trusted-certificate-0001 724s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s ++ sed -n 's/ *commonName *= //p' 724s + key_cn='Test Organization Root Trusted Certificate 0001' 724s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 724s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 724s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 724s + token_name='Test Organization Root Tr Token' 724s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 724s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 724s + echo 'Test Organization Root Tr Token' 724s + '[' -n '' ']' 724s + local output_base_name=SSSD-child-9132 724s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.pem 724s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s Test Organization Root Tr Token 724s [p11_child[2192]] [main] (0x0400): p11_child started. 724s [p11_child[2192]] [main] (0x2000): Running in [pre-auth] mode. 724s [p11_child[2192]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2192]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2192]] [do_card] (0x4000): Module List: 724s [p11_child[2192]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2192]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2192]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2192]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2192]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2192]] [do_card] (0x4000): Login NOT required. 724s [p11_child[2192]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2192]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2192]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2192]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2192]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.pem 724s Certificate: 724s Data: 724s Version: 3 (0x2) 724s Serial Number: 3 (0x3) 724s Signature Algorithm: sha256WithRSAEncryption 724s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 724s Validity 724s Not Before: Mar 12 13:47:17 2024 GMT 724s Not After : Mar 12 13:47:17 2025 GMT 724s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 724s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 724s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 724s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 724s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 724s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 724s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 724s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 724s 1a:27:d0:bb:97:23:95:9a:09 724s Exponent: 65537 (0x10001) 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 724s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 724s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 724s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 724s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 724s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 724s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 724s cc:22 724s + local found_md5 expected_md5 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + expected_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.output 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.output .output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.pem 724s + echo -n 053350 724s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 724s [p11_child[2200]] [main] (0x0400): p11_child started. 724s [p11_child[2200]] [main] (0x2000): Running in [auth] mode. 724s [p11_child[2200]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2200]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2200]] [do_card] (0x4000): Module List: 724s [p11_child[2200]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2200]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2200]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2200]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2200]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2200]] [do_card] (0x4000): Login required. 724s [p11_child[2200]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2200]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2200]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2200]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 724s [p11_child[2200]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 724s [p11_child[2200]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 724s [p11_child[2200]] [do_card] (0x4000): Certificate verified and validated. 724s [p11_child[2200]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.pem 724s Certificate: 724s Data: 724s Version: 3 (0x2) 724s Serial Number: 3 (0x3) 724s Signature Algorithm: sha256WithRSAEncryption 724s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 724s Validity 724s Not Before: Mar 12 13:47:17 2024 GMT 724s Not After : Mar 12 13:47:17 2025 GMT 724s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 724s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 724s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 724s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 724s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 724s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 724s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 724s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 724s 1a:27:d0:bb:97:23:95:9a:09 724s Exponent: 65537 (0x10001) 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 724s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 724s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 724s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 724s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 724s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 724s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 724s cc:22 724s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9132-auth.pem 724s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 724s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 724s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 724s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s + local verify_option=partial_chain 724s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 724s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 724s + local key_cn 724s + local key_name 724s + local tokens_dir 724s + local output_cert_file 724s + token_name= 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 724s + key_name=test-root-CA-trusted-certificate-0001 724s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 724s ++ sed -n 's/ *commonName *= //p' 724s + key_cn='Test Organization Root Trusted Certificate 0001' 724s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 724s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 724s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 724s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 724s + token_name='Test Organization Root Tr Token' 724s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 724s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 724s + echo 'Test Organization Root Tr Token' 724s Test Organization Root Tr Token 724s + '[' -n partial_chain ']' 724s + local verify_arg=--verify=partial_chain 724s + local output_base_name=SSSD-child-3682 724s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.output 724s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.pem 724s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 724s [p11_child[2210]] [main] (0x0400): p11_child started. 724s [p11_child[2210]] [main] (0x2000): Running in [pre-auth] mode. 724s [p11_child[2210]] [main] (0x2000): Running with effective IDs: [0][0]. 724s [p11_child[2210]] [main] (0x2000): Running with real IDs [0][0]. 724s [p11_child[2210]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 724s [p11_child[2210]] [do_card] (0x4000): Module List: 724s [p11_child[2210]] [do_card] (0x4000): common name: [softhsm2]. 724s [p11_child[2210]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2210]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 724s [p11_child[2210]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 724s [p11_child[2210]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 724s [p11_child[2210]] [do_card] (0x4000): Login NOT required. 724s [p11_child[2210]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 724s [p11_child[2210]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 724s [p11_child[2210]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 724s [p11_child[2210]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 724s [p11_child[2210]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 724s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.output 724s + echo '-----BEGIN CERTIFICATE-----' 724s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.output 724s + echo '-----END CERTIFICATE-----' 724s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.pem 725s Certificate: 725s Data: 725s Version: 3 (0x2) 725s Serial Number: 3 (0x3) 725s Signature Algorithm: sha256WithRSAEncryption 725s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 725s Validity 725s Not Before: Mar 12 13:47:17 2024 GMT 725s Not After : Mar 12 13:47:17 2025 GMT 725s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 725s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 725s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 725s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 725s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 725s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 725s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 725s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 725s 1a:27:d0:bb:97:23:95:9a:09 725s Exponent: 65537 (0x10001) 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Root CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 725s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 725s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 725s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 725s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 725s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 725s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 725s cc:22 725s + local found_md5 expected_md5 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s + expected_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682.pem 725s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 725s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 725s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.output 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.output .output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.pem 725s + echo -n 053350 725s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 725s [p11_child[2218]] [main] (0x0400): p11_child started. 725s [p11_child[2218]] [main] (0x2000): Running in [auth] mode. 725s [p11_child[2218]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2218]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2218]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 725s [p11_child[2218]] [do_card] (0x4000): Module List: 725s [p11_child[2218]] [do_card] (0x4000): common name: [softhsm2]. 725s [p11_child[2218]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2218]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 725s [p11_child[2218]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 725s [p11_child[2218]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2218]] [do_card] (0x4000): Login required. 725s [p11_child[2218]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 725s [p11_child[2218]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 725s [p11_child[2218]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 725s [p11_child[2218]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x47e1f7ed;slot-manufacturer=SoftHSM%20project;slot-id=1205991405;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fb744148c7e1f7ed;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 725s [p11_child[2218]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 725s [p11_child[2218]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 725s [p11_child[2218]] [do_card] (0x4000): Certificate verified and validated. 725s [p11_child[2218]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 725s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.output 725s + echo '-----BEGIN CERTIFICATE-----' 725s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.output 725s + echo '-----END CERTIFICATE-----' 725s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.pem 725s Certificate: 725s Data: 725s Version: 3 (0x2) 725s Serial Number: 3 (0x3) 725s Signature Algorithm: sha256WithRSAEncryption 725s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 725s Validity 725s Not Before: Mar 12 13:47:17 2024 GMT 725s Not After : Mar 12 13:47:17 2025 GMT 725s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:ce:9d:31:11:ee:64:83:46:45:5b:2e:dc:35:a3: 725s 71:dc:81:b2:bb:51:c1:41:4d:4f:e4:03:39:a5:ff: 725s f7:77:f4:f4:ea:81:94:99:b0:ec:ba:13:8b:28:f5: 725s 95:5e:a3:57:4e:25:76:50:6b:5d:75:44:16:f2:b0: 725s 9e:6a:22:39:70:7f:59:01:ed:0a:d9:60:43:d5:18: 725s 02:a5:15:49:34:1a:29:eb:b6:30:15:ca:b0:29:8b: 725s 4c:b3:6e:3b:e2:04:ac:80:05:fc:e6:ca:d8:66:29: 725s 69:69:5d:46:81:02:12:74:7f:7a:90:44:62:ef:6a: 725s 1a:27:d0:bb:97:23:95:9a:09 725s Exponent: 65537 (0x10001) 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s 14:67:2A:71:D7:D1:4E:3C:E0:B9:90:3B:9A:CA:6E:0A:1D:E6:D4:4C 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Root CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s CA:BF:52:0A:B2:33:77:E8:53:7C:B6:9B:87:E7:D0:1F:90:57:A5:C5 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s b8:75:97:c2:5d:8c:61:ce:b1:a2:ae:fe:8a:04:f6:cd:f2:59: 725s 7f:f5:ba:06:2f:31:3f:4e:f4:46:e4:15:37:8b:c0:6f:1e:ee: 725s a1:1e:23:3e:37:e0:a2:15:ac:f9:9b:37:14:35:39:40:32:6a: 725s 73:94:ee:87:60:a5:48:d0:b8:1b:60:5b:fd:bd:22:15:d5:62: 725s 30:47:8d:06:dc:9a:d5:a3:97:51:41:e9:1e:3a:9b:2f:36:b8: 725s 9f:dd:bb:29:bf:ee:ae:0e:5a:3c:ff:65:2a:dd:84:b6:30:d5: 725s 3c:de:31:82:e6:60:16:7b:55:00:96:74:e6:cc:3b:58:b9:8d: 725s cc:22 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3682-auth.pem 725s + found_md5=Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 725s + '[' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 '!=' Modulus=CE9D3111EE648346455B2EDC35A371DC81B2BB51C1414D4FE40339A5FFF777F4F4EA819499B0ECBA138B28F5955EA3574E2576506B5D754416F2B09E6A2239707F5901ED0AD96043D51802A51549341A29EBB63015CAB0298B4CB36E3BE204AC8005FCE6CAD8662969695D46810212747F7A904462EF6A1A27D0BB9723959A09 ']' 725s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 725s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s + local verify_option= 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-root-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Root Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 725s Test Organization Root Tr Token 725s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 725s + token_name='Test Organization Root Tr Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 725s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 725s + echo 'Test Organization Root Tr Token' 725s + '[' -n '' ']' 725s + local output_base_name=SSSD-child-4618 725s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-4618.output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-4618.pem 725s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s [p11_child[2228]] [main] (0x0400): p11_child started. 725s [p11_child[2228]] [main] (0x2000): Running in [pre-auth] mode. 725s [p11_child[2228]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2228]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2228]] [do_card] (0x4000): Module List: 725s [p11_child[2228]] [do_card] (0x4000): common name: [softhsm2]. 725s [p11_child[2228]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2228]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 725s [p11_child[2228]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 725s [p11_child[2228]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2228]] [do_card] (0x4000): Login NOT required. 725s [p11_child[2228]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 725s [p11_child[2228]] [do_verification] (0x0040): X509_verify_cert failed [0]. 725s [p11_child[2228]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 725s [p11_child[2228]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 725s [p11_child[2228]] [do_card] (0x4000): No certificate found. 725s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-4618.output 725s + return 2 725s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem partial_chain 725s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem partial_chain 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 725s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s + local verify_option=partial_chain 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-19948 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-root-ca-trusted-cert-0001-19948 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-root-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-root-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Root Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 725s + token_name='Test Organization Root Tr Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 725s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-root-CA-trusted-certificate-0001 ']' 725s + echo 'Test Organization Root Tr Token' 725s Test Organization Root Tr Token 725s + '[' -n partial_chain ']' 725s + local verify_arg=--verify=partial_chain 725s + local output_base_name=SSSD-child-25016 725s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25016.output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25016.pem 725s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 725s [p11_child[2235]] [main] (0x0400): p11_child started. 725s [p11_child[2235]] [main] (0x2000): Running in [pre-auth] mode. 725s [p11_child[2235]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2235]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2235]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 725s [p11_child[2235]] [do_card] (0x4000): Module List: 725s [p11_child[2235]] [do_card] (0x4000): common name: [softhsm2]. 725s [p11_child[2235]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2235]] [do_card] (0x4000): Description [SoftHSM slot ID 0x47e1f7ed] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 725s [p11_child[2235]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 725s [p11_child[2235]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x47e1f7ed][1205991405] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2235]] [do_card] (0x4000): Login NOT required. 725s [p11_child[2235]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 725s [p11_child[2235]] [do_verification] (0x0040): X509_verify_cert failed [0]. 725s [p11_child[2235]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 725s [p11_child[2235]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 725s [p11_child[2235]] [do_card] (0x4000): No certificate found. 725s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25016.output 725s + return 2 725s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /dev/null 725s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /dev/null 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_ring=/dev/null 725s + local verify_option= 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-intermediate-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 725s + token_name='Test Organization Interme Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 725s + local key_file 725s + local decrypted_key 725s + mkdir -p /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 725s + key_file=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key.pem 725s + decrypted_key=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + cat 725s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 725s Slot 0 has a free/uninitialized token. 725s The token has been initialized and is reassigned to slot 1447624521 725s + softhsm2-util --show-slots 725s Available slots: 725s Slot 1447624521 725s Slot info: 725s Description: SoftHSM slot ID 0x5648ff49 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: ac7fc0a2d648ff49 725s Initialized: yes 725s User PIN init.: yes 725s Label: Test Organization Interme Token 725s Slot 1 725s Slot info: 725s Description: SoftHSM slot ID 0x1 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 725s Initialized: no 725s User PIN init.: no 725s Label: 725s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-3415 -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s writing RSA key 725s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + rm /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 725s Object 0: 725s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 725s Type: X.509 Certificate (RSA-1024) 725s Expires: Wed Mar 12 13:47:17 2025 725s Label: Test Organization Intermediate Trusted Certificate 0001 725s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 725s 725s + echo 'Test Organization Interme Token' 725s + '[' -n '' ']' 725s + local output_base_name=SSSD-child-20736 725s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20736.output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20736.pem 725s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 725s Test Organization Interme Token 725s [p11_child[2251]] [main] (0x0400): p11_child started. 725s [p11_child[2251]] [main] (0x2000): Running in [pre-auth] mode. 725s [p11_child[2251]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2251]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2251]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 725s [p11_child[2251]] [do_work] (0x0040): init_verification failed. 725s [p11_child[2251]] [main] (0x0020): p11_child failed (5) 725s + return 2 725s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /dev/null no_verification 725s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /dev/null no_verification 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_ring=/dev/null 725s + local verify_option=no_verification 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-intermediate-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 725s + token_name='Test Organization Interme Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 725s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 725s + echo 'Test Organization Interme Token' 725s Test Organization Interme Token 725s + '[' -n no_verification ']' 725s + local verify_arg=--verify=no_verification 725s + local output_base_name=SSSD-child-25232 725s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.pem 725s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 725s [p11_child[2257]] [main] (0x0400): p11_child started. 725s [p11_child[2257]] [main] (0x2000): Running in [pre-auth] mode. 725s [p11_child[2257]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2257]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2257]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 725s [p11_child[2257]] [do_card] (0x4000): Module List: 725s [p11_child[2257]] [do_card] (0x4000): common name: [softhsm2]. 725s [p11_child[2257]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2257]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 725s [p11_child[2257]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 725s [p11_child[2257]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2257]] [do_card] (0x4000): Login NOT required. 725s [p11_child[2257]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 725s [p11_child[2257]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 725s [p11_child[2257]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 725s [p11_child[2257]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 725s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.output 725s + echo '-----BEGIN CERTIFICATE-----' 725s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.output 725s + echo '-----END CERTIFICATE-----' 725s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.pem 725s Certificate: 725s Data: 725s Version: 3 (0x2) 725s Serial Number: 4 (0x4) 725s Signature Algorithm: sha256WithRSAEncryption 725s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 725s Validity 725s Not Before: Mar 12 13:47:17 2024 GMT 725s Not After : Mar 12 13:47:17 2025 GMT 725s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 725s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 725s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 725s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 725s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 725s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 725s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 725s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 725s 64:67:5a:75:e2:c7:97:61:2f 725s Exponent: 65537 (0x10001) 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 725s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 725s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 725s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 725s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 725s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 725s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 725s 7a:a9 725s + local found_md5 expected_md5 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + expected_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232.pem 725s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 725s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 725s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.output 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.output .output 725s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.pem 725s + echo -n 053350 725s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 725s [p11_child[2265]] [main] (0x0400): p11_child started. 725s [p11_child[2265]] [main] (0x2000): Running in [auth] mode. 725s [p11_child[2265]] [main] (0x2000): Running with effective IDs: [0][0]. 725s [p11_child[2265]] [main] (0x2000): Running with real IDs [0][0]. 725s [p11_child[2265]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 725s [p11_child[2265]] [do_card] (0x4000): Module List: 725s [p11_child[2265]] [do_card] (0x4000): common name: [softhsm2]. 725s [p11_child[2265]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2265]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 725s [p11_child[2265]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 725s [p11_child[2265]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 725s [p11_child[2265]] [do_card] (0x4000): Login required. 725s [p11_child[2265]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 725s [p11_child[2265]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 725s [p11_child[2265]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 725s [p11_child[2265]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 725s [p11_child[2265]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 725s [p11_child[2265]] [do_card] (0x4000): Certificate verified and validated. 725s [p11_child[2265]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 725s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.output 725s + echo '-----BEGIN CERTIFICATE-----' 725s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.output 725s + echo '-----END CERTIFICATE-----' 725s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.pem 725s Certificate: 725s Data: 725s Version: 3 (0x2) 725s Serial Number: 4 (0x4) 725s Signature Algorithm: sha256WithRSAEncryption 725s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 725s Validity 725s Not Before: Mar 12 13:47:17 2024 GMT 725s Not After : Mar 12 13:47:17 2025 GMT 725s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 725s Subject Public Key Info: 725s Public Key Algorithm: rsaEncryption 725s Public-Key: (1024 bit) 725s Modulus: 725s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 725s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 725s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 725s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 725s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 725s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 725s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 725s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 725s 64:67:5a:75:e2:c7:97:61:2f 725s Exponent: 65537 (0x10001) 725s X509v3 extensions: 725s X509v3 Authority Key Identifier: 725s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 725s X509v3 Basic Constraints: 725s CA:FALSE 725s Netscape Cert Type: 725s SSL Client, S/MIME 725s Netscape Comment: 725s Test Organization Intermediate CA trusted Certificate 725s X509v3 Subject Key Identifier: 725s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 725s X509v3 Key Usage: critical 725s Digital Signature, Non Repudiation, Key Encipherment 725s X509v3 Extended Key Usage: 725s TLS Web Client Authentication, E-mail Protection 725s X509v3 Subject Alternative Name: 725s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 725s Signature Algorithm: sha256WithRSAEncryption 725s Signature Value: 725s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 725s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 725s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 725s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 725s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 725s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 725s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 725s 7a:a9 725s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-25232-auth.pem 725s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 725s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 725s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 725s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 725s + local verify_option= 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-intermediate-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s Test Organization Interme Token 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-29299 726s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-29299.output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-29299.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 726s [p11_child[2275]] [main] (0x0400): p11_child started. 726s [p11_child[2275]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2275]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2275]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2275]] [do_card] (0x4000): Module List: 726s [p11_child[2275]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2275]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2275]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2275]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2275]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2275]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2275]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2275]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2275]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2275]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2275]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-29299.output 726s + return 2 726s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s Test Organization Interme Token 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-3293 726s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3293.output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3293.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 726s [p11_child[2282]] [main] (0x0400): p11_child started. 726s [p11_child[2282]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2282]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2282]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2282]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2282]] [do_card] (0x4000): Module List: 726s [p11_child[2282]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2282]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2282]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2282]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2282]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2282]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2282]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2282]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2282]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 726s [p11_child[2282]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2282]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3293.output 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s Test Organization Interme Token 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-28163 726s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s [p11_child[2289]] [main] (0x0400): p11_child started. 726s [p11_child[2289]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2289]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2289]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2289]] [do_card] (0x4000): Module List: 726s [p11_child[2289]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2289]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2289]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2289]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2289]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2289]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2289]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2289]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2289]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2289]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2289]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.pem 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 726s Validity 726s Not Before: Mar 12 13:47:17 2024 GMT 726s Not After : Mar 12 13:47:17 2025 GMT 726s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 726s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 726s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 726s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 726s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 726s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 726s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 726s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 726s 64:67:5a:75:e2:c7:97:61:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 726s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 726s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 726s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 726s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 726s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 726s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 726s 7a:a9 726s + expected_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163.pem 726s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 726s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.output 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2297]] [main] (0x0400): p11_child started. 726s [p11_child[2297]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2297]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2297]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2297]] [do_card] (0x4000): Module List: 726s [p11_child[2297]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2297]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2297]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2297]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2297]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2297]] [do_card] (0x4000): Login required. 726s [p11_child[2297]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2297]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2297]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2297]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2297]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2297]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2297]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2297]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 726s Validity 726s Not Before: Mar 12 13:47:17 2024 GMT 726s Not After : Mar 12 13:47:17 2025 GMT 726s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 726s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 726s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 726s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 726s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 726s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 726s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 726s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 726s 64:67:5a:75:e2:c7:97:61:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 726s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 726s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 726s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 726s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 726s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 726s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 726s 7a:a9 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28163-auth.pem 726s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 726s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s Test Organization Interme Token 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n partial_chain ']' 726s + local verify_arg=--verify=partial_chain 726s + local output_base_name=SSSD-child-16399 726s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 726s [p11_child[2307]] [main] (0x0400): p11_child started. 726s [p11_child[2307]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2307]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2307]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2307]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2307]] [do_card] (0x4000): Module List: 726s [p11_child[2307]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2307]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2307]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2307]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2307]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2307]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2307]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2307]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2307]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2307]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2307]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 726s Validity 726s Not Before: Mar 12 13:47:17 2024 GMT 726s Not After : Mar 12 13:47:17 2025 GMT 726s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 726s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 726s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 726s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 726s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 726s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 726s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 726s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 726s 64:67:5a:75:e2:c7:97:61:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 726s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 726s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 726s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 726s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 726s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 726s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 726s 7a:a9 726s + local found_md5 expected_md5 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + expected_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399.pem 726s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 726s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.output 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.output .output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.pem 726s + echo -n 053350 726s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 726s [p11_child[2315]] [main] (0x0400): p11_child started. 726s [p11_child[2315]] [main] (0x2000): Running in [auth] mode. 726s [p11_child[2315]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2315]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2315]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 726s [p11_child[2315]] [do_card] (0x4000): Module List: 726s [p11_child[2315]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2315]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2315]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2315]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2315]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2315]] [do_card] (0x4000): Login required. 726s [p11_child[2315]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2315]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 726s [p11_child[2315]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 726s [p11_child[2315]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 726s [p11_child[2315]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 726s [p11_child[2315]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 726s [p11_child[2315]] [do_card] (0x4000): Certificate verified and validated. 726s [p11_child[2315]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.output 726s + echo '-----BEGIN CERTIFICATE-----' 726s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.output 726s + echo '-----END CERTIFICATE-----' 726s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.pem 726s Certificate: 726s Data: 726s Version: 3 (0x2) 726s Serial Number: 4 (0x4) 726s Signature Algorithm: sha256WithRSAEncryption 726s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 726s Validity 726s Not Before: Mar 12 13:47:17 2024 GMT 726s Not After : Mar 12 13:47:17 2025 GMT 726s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 726s Subject Public Key Info: 726s Public Key Algorithm: rsaEncryption 726s Public-Key: (1024 bit) 726s Modulus: 726s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 726s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 726s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 726s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 726s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 726s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 726s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 726s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 726s 64:67:5a:75:e2:c7:97:61:2f 726s Exponent: 65537 (0x10001) 726s X509v3 extensions: 726s X509v3 Authority Key Identifier: 726s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 726s X509v3 Basic Constraints: 726s CA:FALSE 726s Netscape Cert Type: 726s SSL Client, S/MIME 726s Netscape Comment: 726s Test Organization Intermediate CA trusted Certificate 726s X509v3 Subject Key Identifier: 726s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 726s X509v3 Key Usage: critical 726s Digital Signature, Non Repudiation, Key Encipherment 726s X509v3 Extended Key Usage: 726s TLS Web Client Authentication, E-mail Protection 726s X509v3 Subject Alternative Name: 726s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 726s Signature Algorithm: sha256WithRSAEncryption 726s Signature Value: 726s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 726s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 726s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 726s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 726s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 726s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 726s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 726s 7a:a9 726s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-16399-auth.pem 726s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 726s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 726s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 726s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 726s + local verify_option= 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 726s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 726s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 726s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 726s Test Organization Interme Token 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 726s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 726s + token_name='Test Organization Interme Token' 726s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 726s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 726s + echo 'Test Organization Interme Token' 726s + '[' -n '' ']' 726s + local output_base_name=SSSD-child-2124 726s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-2124.output 726s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-2124.pem 726s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 726s [p11_child[2325]] [main] (0x0400): p11_child started. 726s [p11_child[2325]] [main] (0x2000): Running in [pre-auth] mode. 726s [p11_child[2325]] [main] (0x2000): Running with effective IDs: [0][0]. 726s [p11_child[2325]] [main] (0x2000): Running with real IDs [0][0]. 726s [p11_child[2325]] [do_card] (0x4000): Module List: 726s [p11_child[2325]] [do_card] (0x4000): common name: [softhsm2]. 726s [p11_child[2325]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2325]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 726s [p11_child[2325]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 726s [p11_child[2325]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 726s [p11_child[2325]] [do_card] (0x4000): Login NOT required. 726s [p11_child[2325]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 726s [p11_child[2325]] [do_verification] (0x0040): X509_verify_cert failed [0]. 726s [p11_child[2325]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 726s [p11_child[2325]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 726s [p11_child[2325]] [do_card] (0x4000): No certificate found. 726s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-2124.output 726s + return 2 726s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem partial_chain 726s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem partial_chain 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 726s + local verify_option=partial_chain 726s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-3415 726s + local key_cn 726s + local key_name 726s + local tokens_dir 726s + local output_cert_file 726s + token_name= 726s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem .pem 726s + key_name=test-intermediate-CA-trusted-certificate-0001 726s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 726s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 727s Test Organization Interme Token 727s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Interme Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Interme Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-30892 727s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem 727s [p11_child[2332]] [main] (0x0400): p11_child started. 727s [p11_child[2332]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2332]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2332]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2332]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2332]] [do_card] (0x4000): Module List: 727s [p11_child[2332]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2332]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2332]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2332]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 727s [p11_child[2332]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2332]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2332]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 727s [p11_child[2332]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2332]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2332]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2332]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 4 (0x4) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 727s Validity 727s Not Before: Mar 12 13:47:17 2024 GMT 727s Not After : Mar 12 13:47:17 2025 GMT 727s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 727s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 727s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 727s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 727s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 727s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 727s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 727s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 727s 64:67:5a:75:e2:c7:97:61:2f 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 727s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 727s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 727s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 727s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 727s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 727s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 727s 7a:a9 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892.pem 727s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 727s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 727s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.output 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2340]] [main] (0x0400): p11_child started. 727s [p11_child[2340]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2340]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2340]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2340]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2340]] [do_card] (0x4000): Module List: 727s [p11_child[2340]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2340]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2340]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5648ff49] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2340]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 727s [p11_child[2340]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x5648ff49][1447624521] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2340]] [do_card] (0x4000): Login required. 727s [p11_child[2340]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 727s [p11_child[2340]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2340]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2340]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5648ff49;slot-manufacturer=SoftHSM%20project;slot-id=1447624521;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ac7fc0a2d648ff49;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2340]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2340]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2340]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2340]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 4 (0x4) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 727s Validity 727s Not Before: Mar 12 13:47:17 2024 GMT 727s Not After : Mar 12 13:47:17 2025 GMT 727s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:c9:36:21:99:4c:e8:50:cf:a7:b8:98:0f:34:cc: 727s 8f:6e:2c:1a:ba:80:1d:7e:55:6b:bd:24:77:75:7c: 727s e0:a9:fd:18:79:97:12:a1:3a:b2:d8:26:87:d4:ac: 727s 44:e7:d7:b0:e3:cb:ac:e6:ed:3e:e7:fd:f9:e8:c7: 727s 03:bd:e4:55:d1:a9:d0:d6:b0:53:2d:2a:a0:e9:99: 727s bd:2b:76:9a:dc:a5:c5:54:ad:47:bb:04:c7:9b:d8: 727s c4:99:02:4a:d0:a0:ca:cd:95:3a:ce:ad:72:30:6f: 727s be:f3:e4:1f:43:45:ca:89:4d:f9:65:9c:a3:70:93: 727s 64:67:5a:75:e2:c7:97:61:2f 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s DF:63:36:DE:AD:9E:E1:14:45:4F:E2:3B:4A:81:B9:77:A7:C9:B7:B2 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 22:28:AE:23:52:93:2F:8A:D6:41:DB:42:99:6F:82:62:05:84:CD:72 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 02:37:8c:75:c3:95:c2:ee:65:ab:7f:79:dc:c6:a1:83:44:ce: 727s d8:f0:dd:75:f7:83:f6:1b:b0:eb:32:ba:43:0f:47:68:25:46: 727s 1c:53:f6:89:ea:6c:20:e9:34:11:f1:0c:96:bd:b0:46:d9:3d: 727s d6:8a:7d:c5:a0:74:7d:14:b4:8a:e1:8c:f4:8c:e5:0d:94:48: 727s 0b:57:5a:05:31:24:9c:ca:aa:94:60:ed:f0:e2:ed:97:ba:55: 727s 81:41:d3:1a:ba:da:a0:9b:29:fd:8e:81:51:64:a9:91:8b:97: 727s 4d:a3:cc:d5:a9:b0:1c:79:b8:d1:13:52:0f:c2:08:8d:08:56: 727s 7a:a9 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-30892-auth.pem 727s + found_md5=Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F 727s + '[' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F '!=' Modulus=C93621994CE850CFA7B8980F34CC8F6E2C1ABA801D7E556BBD2477757CE0A9FD18799712A13AB2D82687D4AC44E7D7B0E3CBACE6ED3EE7FDF9E8C703BDE455D1A9D0D6B0532D2AA0E999BD2B769ADCA5C554AD47BB04C79BD8C499024AD0A0CACD953ACEAD72306FBEF3E41F4345CA894DF9659CA3709364675A75E2C797612F ']' 727s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s + local verify_option= 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + local key_file 727s + local decrypted_key 727s + mkdir -p /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + key_file=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 727s + decrypted_key=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s + cat 727s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 727s Slot 0 has a free/uninitialized token. 727s The token has been initialized and is reassigned to slot 1394735523 727s + softhsm2-util --show-slots 727s Available slots: 727s Slot 1394735523 727s Slot info: 727s Description: SoftHSM slot ID 0x5321f9a3 727s Manufacturer ID: SoftHSM project 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Token present: yes 727s Token info: 727s Manufacturer ID: SoftHSM project 727s Model: SoftHSM v2 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Serial number: 5340e90e5321f9a3 727s Initialized: yes 727s User PIN init.: yes 727s Label: Test Organization Sub Int Token 727s Slot 1 727s Slot info: 727s Description: SoftHSM slot ID 0x1 727s Manufacturer ID: SoftHSM project 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Token present: yes 727s Token info: 727s Manufacturer ID: SoftHSM project 727s Model: SoftHSM v2 727s Hardware version: 2.6 727s Firmware version: 2.6 727s Serial number: 727s Initialized: no 727s User PIN init.: no 727s Label: 727s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 727s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-7118 -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s writing RSA key 727s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 727s + rm /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 727s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 727s Object 0: 727s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 727s Type: X.509 Certificate (RSA-1024) 727s Expires: Wed Mar 12 13:47:17 2025 727s Label: Test Organization Sub Intermediate Trusted Certificate 0001 727s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 727s 727s Test Organization Sub Int Token 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n '' ']' 727s + local output_base_name=SSSD-child-3261 727s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3261.output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-3261.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s [p11_child[2359]] [main] (0x0400): p11_child started. 727s [p11_child[2359]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2359]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2359]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2359]] [do_card] (0x4000): Module List: 727s [p11_child[2359]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2359]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2359]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2359]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2359]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2359]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2359]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2359]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2359]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 727s [p11_child[2359]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2359]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-3261.output 727s + return 2 727s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s Test Organization Sub Int Token 727s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n partial_chain ']' 727s + local verify_arg=--verify=partial_chain 727s + local output_base_name=SSSD-child-31948 727s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31948.output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-31948.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-CA.pem 727s [p11_child[2366]] [main] (0x0400): p11_child started. 727s [p11_child[2366]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2366]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2366]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2366]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 727s [p11_child[2366]] [do_card] (0x4000): Module List: 727s [p11_child[2366]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2366]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2366]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2366]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2366]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2366]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2366]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2366]] [do_verification] (0x0040): X509_verify_cert failed [0]. 727s [p11_child[2366]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 727s [p11_child[2366]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 727s [p11_child[2366]] [do_card] (0x4000): No certificate found. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-31948.output 727s + return 2 727s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 727s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 727s + local verify_option= 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 727s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 727s Test Organization Sub Int Token 727s + token_name='Test Organization Sub Int Token' 727s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 727s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 727s + echo 'Test Organization Sub Int Token' 727s + '[' -n '' ']' 727s + local output_base_name=SSSD-child-20662 727s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.pem 727s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 727s [p11_child[2373]] [main] (0x0400): p11_child started. 727s [p11_child[2373]] [main] (0x2000): Running in [pre-auth] mode. 727s [p11_child[2373]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2373]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2373]] [do_card] (0x4000): Module List: 727s [p11_child[2373]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2373]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2373]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2373]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2373]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2373]] [do_card] (0x4000): Login NOT required. 727s [p11_child[2373]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2373]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2373]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2373]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2373]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Mar 12 13:47:17 2024 GMT 727s Not After : Mar 12 13:47:17 2025 GMT 727s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 727s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 727s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 727s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 727s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 727s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 727s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 727s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 727s 12:31:0b:a5:cd:dd:94:2a:dd 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 727s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 727s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 727s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 727s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 727s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 727s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 727s 07:ec 727s + local found_md5 expected_md5 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + expected_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662.pem 727s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 727s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 727s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.output 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.output .output 727s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.pem 727s + echo -n 053350 727s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 727s [p11_child[2381]] [main] (0x0400): p11_child started. 727s [p11_child[2381]] [main] (0x2000): Running in [auth] mode. 727s [p11_child[2381]] [main] (0x2000): Running with effective IDs: [0][0]. 727s [p11_child[2381]] [main] (0x2000): Running with real IDs [0][0]. 727s [p11_child[2381]] [do_card] (0x4000): Module List: 727s [p11_child[2381]] [do_card] (0x4000): common name: [softhsm2]. 727s [p11_child[2381]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2381]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 727s [p11_child[2381]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 727s [p11_child[2381]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 727s [p11_child[2381]] [do_card] (0x4000): Login required. 727s [p11_child[2381]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 727s [p11_child[2381]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 727s [p11_child[2381]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 727s [p11_child[2381]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 727s [p11_child[2381]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 727s [p11_child[2381]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 727s [p11_child[2381]] [do_card] (0x4000): Certificate verified and validated. 727s [p11_child[2381]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 727s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.output 727s + echo '-----BEGIN CERTIFICATE-----' 727s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.output 727s + echo '-----END CERTIFICATE-----' 727s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.pem 727s Certificate: 727s Data: 727s Version: 3 (0x2) 727s Serial Number: 5 (0x5) 727s Signature Algorithm: sha256WithRSAEncryption 727s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 727s Validity 727s Not Before: Mar 12 13:47:17 2024 GMT 727s Not After : Mar 12 13:47:17 2025 GMT 727s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 727s Subject Public Key Info: 727s Public Key Algorithm: rsaEncryption 727s Public-Key: (1024 bit) 727s Modulus: 727s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 727s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 727s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 727s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 727s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 727s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 727s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 727s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 727s 12:31:0b:a5:cd:dd:94:2a:dd 727s Exponent: 65537 (0x10001) 727s X509v3 extensions: 727s X509v3 Authority Key Identifier: 727s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 727s X509v3 Basic Constraints: 727s CA:FALSE 727s Netscape Cert Type: 727s SSL Client, S/MIME 727s Netscape Comment: 727s Test Organization Sub Intermediate CA trusted Certificate 727s X509v3 Subject Key Identifier: 727s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 727s X509v3 Key Usage: critical 727s Digital Signature, Non Repudiation, Key Encipherment 727s X509v3 Extended Key Usage: 727s TLS Web Client Authentication, E-mail Protection 727s X509v3 Subject Alternative Name: 727s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 727s Signature Algorithm: sha256WithRSAEncryption 727s Signature Value: 727s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 727s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 727s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 727s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 727s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 727s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 727s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 727s 07:ec 727s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-20662-auth.pem 727s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 727s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 727s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 727s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem partial_chain 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 727s + local verify_option=partial_chain 727s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 727s + local key_cn 727s + local key_name 727s + local tokens_dir 727s + local output_cert_file 727s + token_name= 727s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 727s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 727s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 727s ++ sed -n 's/ *commonName *= //p' 727s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 727s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 727s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 727s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 728s Test Organization Sub Int Token 728s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 728s + token_name='Test Organization Sub Int Token' 728s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 728s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 728s + echo 'Test Organization Sub Int Token' 728s + '[' -n partial_chain ']' 728s + local verify_arg=--verify=partial_chain 728s + local output_base_name=SSSD-child-12051 728s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.pem 728s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem 728s [p11_child[2391]] [main] (0x0400): p11_child started. 728s [p11_child[2391]] [main] (0x2000): Running in [pre-auth] mode. 728s [p11_child[2391]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2391]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2391]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2391]] [do_card] (0x4000): Module List: 728s [p11_child[2391]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2391]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2391]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2391]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2391]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2391]] [do_card] (0x4000): Login NOT required. 728s [p11_child[2391]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2391]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2391]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2391]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2391]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.pem 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 728s + local found_md5 expected_md5 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + expected_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051.pem 728s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 728s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.output 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.output .output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.pem 728s + echo -n 053350 728s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 728s [p11_child[2399]] [main] (0x0400): p11_child started. 728s [p11_child[2399]] [main] (0x2000): Running in [auth] mode. 728s [p11_child[2399]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2399]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2399]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2399]] [do_card] (0x4000): Module List: 728s [p11_child[2399]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2399]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2399]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2399]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2399]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2399]] [do_card] (0x4000): Login required. 728s [p11_child[2399]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2399]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2399]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2399]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 728s [p11_child[2399]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 728s [p11_child[2399]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 728s [p11_child[2399]] [do_card] (0x4000): Certificate verified and validated. 728s [p11_child[2399]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.pem 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-12051-auth.pem 728s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 728s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s + local verify_option= 728s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_cn 728s + local key_name 728s + local tokens_dir 728s + local output_cert_file 728s + token_name= 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 728s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 728s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s ++ sed -n 's/ *commonName *= //p' 728s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 728s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 728s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 728s Test Organization Sub Int Token 728s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 728s + token_name='Test Organization Sub Int Token' 728s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 728s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 728s + echo 'Test Organization Sub Int Token' 728s + '[' -n '' ']' 728s + local output_base_name=SSSD-child-28357 728s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28357.output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-28357.pem 728s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s [p11_child[2409]] [main] (0x0400): p11_child started. 728s [p11_child[2409]] [main] (0x2000): Running in [pre-auth] mode. 728s [p11_child[2409]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2409]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2409]] [do_card] (0x4000): Module List: 728s [p11_child[2409]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2409]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2409]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2409]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2409]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2409]] [do_card] (0x4000): Login NOT required. 728s [p11_child[2409]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2409]] [do_verification] (0x0040): X509_verify_cert failed [0]. 728s [p11_child[2409]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 728s [p11_child[2409]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 728s [p11_child[2409]] [do_card] (0x4000): No certificate found. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-28357.output 728s + return 2 728s + invalid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem partial_chain 728s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem partial_chain 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem 728s + local verify_option=partial_chain 728s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_cn 728s + local key_name 728s + local tokens_dir 728s + local output_cert_file 728s + token_name= 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 728s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 728s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s ++ sed -n 's/ *commonName *= //p' 728s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 728s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 728s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 728s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 728s + token_name='Test Organization Sub Int Token' 728s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 728s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 728s + echo 'Test Organization Sub Int Token' 728s + '[' -n partial_chain ']' 728s + local verify_arg=--verify=partial_chain 728s + local output_base_name=SSSD-child-9824 728s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9824.output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-9824.pem 728s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-root-intermediate-chain-CA.pem 728s Test Organization Sub Int Token 728s [p11_child[2416]] [main] (0x0400): p11_child started. 728s [p11_child[2416]] [main] (0x2000): Running in [pre-auth] mode. 728s [p11_child[2416]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2416]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2416]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2416]] [do_card] (0x4000): Module List: 728s [p11_child[2416]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2416]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2416]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2416]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2416]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2416]] [do_card] (0x4000): Login NOT required. 728s [p11_child[2416]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2416]] [do_verification] (0x0040): X509_verify_cert failed [0]. 728s [p11_child[2416]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 728s [p11_child[2416]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 728s [p11_child[2416]] [do_card] (0x4000): No certificate found. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-9824.output 728s + return 2 728s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem partial_chain 728s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem partial_chain 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s + local verify_option=partial_chain 728s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_cn 728s + local key_name 728s + local tokens_dir 728s + local output_cert_file 728s + token_name= 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 728s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 728s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s ++ sed -n 's/ *commonName *= //p' 728s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 728s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 728s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 728s Test Organization Sub Int Token 728s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 728s + token_name='Test Organization Sub Int Token' 728s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 728s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 728s + echo 'Test Organization Sub Int Token' 728s + '[' -n partial_chain ']' 728s + local verify_arg=--verify=partial_chain 728s + local output_base_name=SSSD-child-17912 728s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.pem 728s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem 728s [p11_child[2423]] [main] (0x0400): p11_child started. 728s [p11_child[2423]] [main] (0x2000): Running in [pre-auth] mode. 728s [p11_child[2423]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2423]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2423]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2423]] [do_card] (0x4000): Module List: 728s [p11_child[2423]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2423]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2423]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2423]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2423]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2423]] [do_card] (0x4000): Login NOT required. 728s [p11_child[2423]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2423]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2423]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2423]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2423]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.pem 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 728s + local found_md5 expected_md5 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + expected_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912.pem 728s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 728s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.output 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.output .output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.pem 728s + echo -n 053350 728s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 728s [p11_child[2431]] [main] (0x0400): p11_child started. 728s [p11_child[2431]] [main] (0x2000): Running in [auth] mode. 728s [p11_child[2431]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2431]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2431]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2431]] [do_card] (0x4000): Module List: 728s [p11_child[2431]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2431]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2431]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2431]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2431]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2431]] [do_card] (0x4000): Login required. 728s [p11_child[2431]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2431]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2431]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2431]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 728s [p11_child[2431]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 728s [p11_child[2431]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 728s [p11_child[2431]] [do_card] (0x4000): Certificate verified and validated. 728s [p11_child[2431]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.pem 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-17912-auth.pem 728s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 728s + valid_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-sub-chain-CA.pem partial_chain 728s + check_certificate /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 /tmp/sssd-softhsm2-rLk9i3/test-intermediate-sub-chain-CA.pem partial_chain 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_ring=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-sub-chain-CA.pem 728s + local verify_option=partial_chain 728s + prepare_softhsm2_card /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local certificate=/tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-7118 728s + local key_cn 728s + local key_name 728s + local tokens_dir 728s + local output_cert_file 728s + token_name= 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 728s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 728s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s ++ sed -n 's/ *commonName *= //p' 728s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 728s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 728s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 728s + tokens_dir=/tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 728s + token_name='Test Organization Sub Int Token' 728s + '[' '!' -e /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 728s + '[' '!' -d /tmp/sssd-softhsm2-rLk9i3/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 728s + echo 'Test Organization Sub Int Token' 728s + '[' -n partial_chain ']' 728s + local verify_arg=--verify=partial_chain 728s Test Organization Sub Int Token 728s + local output_base_name=SSSD-child-606 728s + local output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.pem 728s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-sub-chain-CA.pem 728s [p11_child[2441]] [main] (0x0400): p11_child started. 728s [p11_child[2441]] [main] (0x2000): Running in [pre-auth] mode. 728s [p11_child[2441]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2441]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2441]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2441]] [do_card] (0x4000): Module List: 728s [p11_child[2441]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2441]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2441]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2441]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2441]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2441]] [do_card] (0x4000): Login NOT required. 728s [p11_child[2441]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2441]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2441]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2441]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2441]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.pem 728s + local found_md5 expected_md5 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/test-sub-intermediate-CA-trusted-certificate-0001.pem 728s + expected_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606.pem 728s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 728s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 728s + output_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.output 728s ++ basename /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.output .output 728s + output_cert_file=/tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.pem 728s + echo -n 053350 728s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-rLk9i3/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 728s [p11_child[2449]] [main] (0x0400): p11_child started. 728s [p11_child[2449]] [main] (0x2000): Running in [auth] mode. 728s [p11_child[2449]] [main] (0x2000): Running with effective IDs: [0][0]. 728s [p11_child[2449]] [main] (0x2000): Running with real IDs [0][0]. 728s [p11_child[2449]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 728s [p11_child[2449]] [do_card] (0x4000): Module List: 728s [p11_child[2449]] [do_card] (0x4000): common name: [softhsm2]. 728s [p11_child[2449]] [do_card] (0x4000): dll name: [/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2449]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5321f9a3] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 728s [p11_child[2449]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 728s [p11_child[2449]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5321f9a3][1394735523] of module [0][/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so]. 728s [p11_child[2449]] [do_card] (0x4000): Login required. 728s [p11_child[2449]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 728s [p11_child[2449]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 728s [p11_child[2449]] [do_card] (0x4000): /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 728s [p11_child[2449]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5321f9a3;slot-manufacturer=SoftHSM%20project;slot-id=1394735523;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5340e90e5321f9a3;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 728s [p11_child[2449]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 728s [p11_child[2449]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 728s [p11_child[2449]] [do_card] (0x4000): Certificate verified and validated. 728s [p11_child[2449]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 728s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.output 728s + echo '-----BEGIN CERTIFICATE-----' 728s + tail -n1 /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.output 728s + echo '-----END CERTIFICATE-----' 728s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.pem 728s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-rLk9i3/SSSD-child-606-auth.pem 728s Certificate: 728s Data: 728s Version: 3 (0x2) 728s Serial Number: 5 (0x5) 728s Signature Algorithm: sha256WithRSAEncryption 728s Issuer: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 728s Validity 728s Not Before: Mar 12 13:47:17 2024 GMT 728s Not After : Mar 12 13:47:17 2025 GMT 728s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 728s Subject Public Key Info: 728s Public Key Algorithm: rsaEncryption 728s Public-Key: (1024 bit) 728s Modulus: 728s 00:bc:be:50:84:f1:ee:69:20:8d:be:03:9e:4f:76: 728s b4:a7:66:13:a1:02:b7:d8:8d:5d:62:b1:40:0d:27: 728s c5:c6:2d:e3:02:88:a4:c8:f0:30:88:77:83:31:75: 728s 8e:cd:5b:76:b0:07:e6:cf:f3:2f:10:1e:5a:1e:33: 728s 30:37:55:87:66:60:53:b5:66:9e:c3:74:0c:c8:44: 728s 4a:cc:b1:13:94:06:c6:b2:12:c2:db:d5:a3:0d:1f: 728s 32:dd:d5:25:f1:ef:21:eb:77:63:ef:32:4e:a9:d0: 728s f5:6d:48:a1:02:84:59:0c:78:6e:85:47:f5:68:93: 728s 12:31:0b:a5:cd:dd:94:2a:dd 728s Exponent: 65537 (0x10001) 728s X509v3 extensions: 728s X509v3 Authority Key Identifier: 728s EE:AD:B9:5A:B9:D2:19:4B:E4:F1:72:FF:C7:5C:37:D6:BB:28:00:F2 728s X509v3 Basic Constraints: 728s CA:FALSE 728s Netscape Cert Type: 728s SSL Client, S/MIME 728s Netscape Comment: 728s Test Organization Sub Intermediate CA trusted Certificate 728s X509v3 Subject Key Identifier: 728s 8D:CD:26:2E:35:31:C3:08:5A:11:A2:DF:BF:E3:80:6D:66:C3:03:50 728s X509v3 Key Usage: critical 728s Digital Signature, Non Repudiation, Key Encipherment 728s X509v3 Extended Key Usage: 728s TLS Web Client Authentication, E-mail Protection 728s X509v3 Subject Alternative Name: 728s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 728s Signature Algorithm: sha256WithRSAEncryption 728s Signature Value: 728s 0f:df:1f:28:86:ce:af:60:16:7e:2d:9a:f0:77:e4:9a:56:ad: 728s 7a:3b:08:84:66:4d:eb:c6:0e:95:ad:8b:1c:14:c2:dc:0c:82: 728s 4f:bf:13:f6:e7:6f:53:2b:6f:29:1f:6a:57:ca:d2:08:be:bb: 728s 5c:63:fe:3a:03:8b:2b:56:a0:64:ff:df:0f:a2:4d:38:df:69: 728s a6:9d:4d:a8:88:76:44:36:0f:dc:24:7b:04:34:83:3e:a0:03: 728s 35:cd:2b:6c:28:4a:37:54:a8:de:c4:6e:3b:a2:62:4e:a1:cb: 728s 9c:a5:c4:2e:8f:a3:cb:28:1c:ea:e6:b5:66:bd:59:62:97:81: 728s 07:ec 729s + found_md5=Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD 729s + '[' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD '!=' Modulus=BCBE5084F1EE69208DBE039E4F76B4A76613A102B7D88D5D62B1400D27C5C62DE30288A4C8F03088778331758ECD5B76B007E6CFF32F101E5A1E3330375587666053B5669EC3740CC8444ACCB1139406C6B212C2DBD5A30D1F32DDD525F1EF21EB7763EF324EA9D0F56D48A10284590C786E8547F5689312310BA5CDDD942ADD ']' 729s + set +x 729s 729s Test completed, Root CA and intermediate issued certificates verified! 729s autopkgtest [13:47:24]: test sssd-softhism2-certificates-tests.sh: -----------------------] 729s autopkgtest [13:47:24]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 729s sssd-softhism2-certificates-tests.sh PASS 730s autopkgtest [13:47:25]: test sssd-smart-card-pam-auth-configs: preparing testbed 734s Reading package lists... 734s Building dependency tree... 734s Reading state information... 734s Correcting dependencies...Starting pkgProblemResolver with broken count: 0 734s Starting 2 pkgProblemResolver with broken count: 0 734s Done 735s Done 735s Starting pkgProblemResolver with broken count: 0 735s Starting 2 pkgProblemResolver with broken count: 0 735s Done 736s The following additional packages will be installed: 736s pamtester 736s The following NEW packages will be installed: 736s pamtester 736s 0 upgraded, 1 newly installed, 0 to remove and 191 not upgraded. 736s 1 not fully installed or removed. 736s Need to get 12.3 kB of archives. 736s After this operation, 36.9 kB of additional disk space will be used. 736s Get:1 http://ftpmaster.internal/ubuntu noble/universe arm64 pamtester arm64 0.1.2-4 [12.3 kB] 737s Fetched 12.3 kB in 0s (55.4 kB/s) 737s Selecting previously unselected package pamtester. 737s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74947 files and directories currently installed.) 737s Preparing to unpack .../pamtester_0.1.2-4_arm64.deb ... 737s Unpacking pamtester (0.1.2-4) ... 737s Setting up pamtester (0.1.2-4) ... 737s Setting up autopkgtest-satdep (0) ... 737s Processing triggers for man-db (2.12.0-3) ... 741s (Reading database ... 74953 files and directories currently installed.) 741s Removing autopkgtest-satdep (0) ... 742s autopkgtest [13:47:37]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 742s autopkgtest [13:47:37]: test sssd-smart-card-pam-auth-configs: [----------------------- 743s + '[' -z ubuntu ']' 743s + export DEBIAN_FRONTEND=noninteractive 743s + DEBIAN_FRONTEND=noninteractive 743s + required_tools=(pamtester softhsm2-util sssd) 743s + [[ ! -v OFFLINE_MODE ]] 743s + for cmd in "${required_tools[@]}" 743s + command -v pamtester 743s + for cmd in "${required_tools[@]}" 743s + command -v softhsm2-util 743s + for cmd in "${required_tools[@]}" 743s + command -v sssd 743s + PIN=123456 743s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 743s + tmpdir=/tmp/sssd-softhsm2-certs-QGcJD2 743s + backupsdir= 743s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 743s + declare -a restore_paths 743s + declare -a delete_paths 743s + trap handle_exit EXIT 743s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 743s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 743s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 743s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 743s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-QGcJD2 GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 743s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-QGcJD2 743s + GENERATE_SMART_CARDS=1 743s + KEEP_TEMPORARY_FILES=1 743s + NO_SSSD_TESTS=1 743s + bash debian/tests/sssd-softhism2-certificates-tests.sh 743s + '[' -z ubuntu ']' 743s + required_tools=(p11tool openssl softhsm2-util) 743s + for cmd in "${required_tools[@]}" 743s + command -v p11tool 743s + for cmd in "${required_tools[@]}" 743s + command -v openssl 743s + for cmd in "${required_tools[@]}" 743s + command -v softhsm2-util 743s + PIN=123456 743s +++ find /usr/lib/softhsm/libsofthsm2.so 743s +++ head -n 1 743s ++ realpath /usr/lib/softhsm/libsofthsm2.so 743s + SOFTHSM2_MODULE=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so 743s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 743s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 743s + '[' '!' -v NO_SSSD_TESTS ']' 743s + '[' '!' -e /usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so ']' 743s + tmpdir=/tmp/sssd-softhsm2-certs-QGcJD2 743s + keys_size=1024 743s + [[ ! -v KEEP_TEMPORARY_FILES ]] 743s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 743s + echo -n 01 743s + touch /tmp/sssd-softhsm2-certs-QGcJD2/index.txt 743s + mkdir -p /tmp/sssd-softhsm2-certs-QGcJD2/new_certs 743s + cat 743s + root_ca_key_pass=pass:random-root-CA-password-9246 743s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-key.pem -passout pass:random-root-CA-password-9246 1024 743s + openssl req -passin pass:random-root-CA-password-9246 -batch -config /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem 743s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem 743s + cat 743s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-11173 743s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-11173 1024 743s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-11173 -config /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-9246 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-certificate-request.pem 743s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-certificate-request.pem 743s Certificate Request: 743s Data: 743s Version: 1 (0x0) 743s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 743s Subject Public Key Info: 743s Public Key Algorithm: rsaEncryption 743s Public-Key: (1024 bit) 743s Modulus: 743s 00:b3:ee:ab:f2:1d:c3:31:d4:8b:61:d1:d7:87:7c: 743s cf:ed:d8:31:45:46:00:f7:19:09:98:56:14:08:94: 743s 26:b5:9d:b7:b3:7b:56:7d:7d:55:70:b6:0d:3f:ab: 743s a4:c5:a3:14:3d:0c:b2:a7:c5:1c:4b:f8:e7:5f:6f: 743s 5a:86:6b:06:a2:ff:e4:67:2d:29:c2:f7:e6:cb:29: 743s b3:b7:6b:9f:74:3d:dc:d3:15:1e:f5:fb:c2:86:ee: 743s 63:9c:ee:16:c9:4d:12:e7:c8:05:98:f0:66:6b:e2: 743s 19:af:cf:f8:3c:b7:35:8c:f7:a4:53:cf:9d:f7:80: 743s 56:06:fd:e5:0b:70:95:b5:d9 743s Exponent: 65537 (0x10001) 743s Attributes: 743s (none) 743s Requested Extensions: 743s Signature Algorithm: sha256WithRSAEncryption 743s Signature Value: 743s 0d:8c:ca:d2:65:d6:57:7e:3c:c8:56:af:19:0a:f2:11:3f:18: 743s 3d:97:52:2f:f5:0b:2e:ab:d0:49:a7:93:d2:8a:ee:aa:88:42: 743s 91:ea:bf:19:a5:8c:3d:5c:5f:0f:b5:03:b0:9c:e0:16:66:df: 743s 81:8e:1f:0d:29:9f:06:27:e0:33:03:e5:00:4b:5d:2a:a3:01: 743s a7:02:55:ad:3d:a2:73:3a:7c:04:73:e3:65:43:8b:22:fa:6b: 743s eb:cd:10:47:1d:14:8b:60:fc:56:72:60:42:0f:88:b8:2c:61: 743s ad:e4:db:cb:8c:10:24:52:e4:95:bb:2d:18:54:0c:fc:ee:11: 743s d5:35 743s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.config -passin pass:random-root-CA-password-9246 -keyfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem 743s Using configuration from /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.config 743s Check that the request matches the signature 743s Signature ok 743s Certificate Details: 743s Serial Number: 1 (0x1) 743s Validity 743s Not Before: Mar 12 13:47:38 2024 GMT 743s Not After : Mar 12 13:47:38 2025 GMT 743s Subject: 743s organizationName = Test Organization 743s organizationalUnitName = Test Organization Unit 743s commonName = Test Organization Intermediate CA 743s X509v3 extensions: 743s X509v3 Subject Key Identifier: 743s 0B:E0:0F:24:DE:3B:B5:62:16:F6:8E:35:D5:D3:25:EF:A9:D3:F9:C0 743s X509v3 Authority Key Identifier: 743s keyid:F4:CB:1C:EB:2E:B5:0E:23:68:89:6E:B4:A5:E0:C2:DC:92:08:BA:C9 743s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 743s serial:00 743s X509v3 Basic Constraints: 743s CA:TRUE 743s X509v3 Key Usage: critical 743s Digital Signature, Certificate Sign, CRL Sign 743s Certificate is to be certified until Mar 12 13:47:38 2025 GMT (365 days) 743s 743s Write out database with 1 new entries 743s Database updated 743s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem 743s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem 743s /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem: OK 743s + cat 743s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-18712 743s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-18712 1024 743s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-18712 -config /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-11173 -sha256 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-certificate-request.pem 743s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-certificate-request.pem 743s Certificate Request: 743s Data: 743s Version: 1 (0x0) 743s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 743s Subject Public Key Info: 743s Public Key Algorithm: rsaEncryption 743s Public-Key: (1024 bit) 743s Modulus: 743s 00:d6:49:1c:0d:3d:40:6b:b7:2d:d3:04:92:95:8c: 743s 3f:45:12:53:09:43:b6:60:81:7a:45:b1:24:07:1c: 743s da:8f:d5:05:e9:01:ab:e9:40:24:0c:d6:5a:9d:05: 743s 07:ea:4c:f5:3f:c5:de:5f:e8:c1:8e:ba:09:49:c1: 743s c7:6a:7c:89:51:34:a8:05:58:0e:d6:d4:c6:a7:ec: 743s 27:88:79:8b:45:ac:f8:c8:b5:64:fe:1c:a2:65:6b: 743s 7c:8d:a7:a9:5d:e8:93:90:f2:87:fa:8a:95:dc:bc: 743s c5:1e:8c:58:a7:61:38:12:b9:98:2f:43:7a:29:0b: 743s 89:2a:84:ef:d2:da:12:d2:0b 743s Exponent: 65537 (0x10001) 743s Attributes: 743s (none) 743s Requested Extensions: 743s Signature Algorithm: sha256WithRSAEncryption 743s Signature Value: 743s 7e:60:b4:57:e3:c2:4f:b3:d9:3a:e8:06:b0:19:a3:04:8b:cb: 743s ba:42:60:15:36:28:59:13:59:a1:e4:50:1a:73:78:99:60:de: 743s ba:fe:ce:22:04:41:01:d9:7b:4a:41:a6:89:29:e7:6b:c2:8b: 743s 4d:62:12:7f:92:de:33:13:1a:05:76:b2:5c:03:b1:10:14:a9: 743s 80:e0:8b:42:ec:a5:27:c3:04:b3:9f:26:1b:56:30:10:89:13: 743s c0:35:f4:c0:39:54:b8:b7:28:d7:69:73:ba:5c:22:a3:08:35: 743s 55:0b:00:64:2c:ee:cc:ae:77:6e:dc:31:79:94:dd:b8:dc:78: 743s ab:cc 743s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-11173 -keyfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 743s Using configuration from /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.config 743s Check that the request matches the signature 743s Signature ok 743s Certificate Details: 743s Serial Number: 2 (0x2) 743s Validity 743s Not Before: Mar 12 13:47:38 2024 GMT 743s Not After : Mar 12 13:47:38 2025 GMT 743s Subject: 743s organizationName = Test Organization 743s organizationalUnitName = Test Organization Unit 743s commonName = Test Organization Sub Intermediate CA 743s X509v3 extensions: 743s X509v3 Subject Key Identifier: 743s 81:65:B0:35:59:E9:3A:8A:C6:3A:E7:75:A3:1A:10:B7:DD:4C:96:C6 743s X509v3 Authority Key Identifier: 743s keyid:0B:E0:0F:24:DE:3B:B5:62:16:F6:8E:35:D5:D3:25:EF:A9:D3:F9:C0 743s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 743s serial:01 743s X509v3 Basic Constraints: 743s CA:TRUE 743s X509v3 Key Usage: critical 743s Digital Signature, Certificate Sign, CRL Sign 743s Certificate is to be certified until Mar 12 13:47:38 2025 GMT (365 days) 743s 743s Write out database with 1 new entries 743s Database updated 743s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 743s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 743s /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem: OK 743s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 743s + local cmd=openssl 743s + shift 743s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 743s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 743s error 20 at 0 depth lookup: unable to get local issuer certificate 743s error /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem: verification failed 743s + cat 743s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-749 743s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-749 1024 743s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-749 -key /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-request.pem 743s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-request.pem 743s Certificate Request: 743s Data: 743s Version: 1 (0x0) 743s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 743s Subject Public Key Info: 743s Public Key Algorithm: rsaEncryption 743s Public-Key: (1024 bit) 743s Modulus: 743s 00:c0:8b:fd:20:e5:97:94:99:78:02:38:12:27:c6: 743s fc:e2:c4:eb:c1:cb:c0:97:76:c0:47:02:da:11:35: 743s b4:76:df:c9:c1:3a:11:5b:d9:d1:ec:51:79:e2:91: 743s 7a:29:44:79:7d:fb:da:db:01:49:01:d2:48:db:32: 743s be:f4:52:d3:96:b6:86:1e:fe:98:41:bb:75:a8:f9: 743s b7:cb:18:04:b8:17:77:f1:a2:4b:cf:03:50:f4:ae: 743s e3:1e:c2:24:12:34:e7:c0:a1:f9:b5:af:54:a1:14: 743s 62:45:b1:60:c5:90:2a:06:6a:10:2d:bb:c0:dd:16: 743s 5e:cc:84:86:93:51:64:d0:fd 743s Exponent: 65537 (0x10001) 743s Attributes: 743s Requested Extensions: 743s X509v3 Basic Constraints: 743s CA:FALSE 743s Netscape Cert Type: 743s SSL Client, S/MIME 743s Netscape Comment: 743s Test Organization Root CA trusted Certificate 743s X509v3 Subject Key Identifier: 743s 9B:84:2C:A0:C8:1D:2B:47:C8:C5:87:A7:7E:49:5C:AF:76:FF:DC:4E 743s X509v3 Key Usage: critical 743s Digital Signature, Non Repudiation, Key Encipherment 743s X509v3 Extended Key Usage: 743s TLS Web Client Authentication, E-mail Protection 743s X509v3 Subject Alternative Name: 743s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 743s Signature Algorithm: sha256WithRSAEncryption 743s Signature Value: 743s 9f:41:b9:d8:b9:c3:c1:50:f4:54:ea:e7:c5:78:43:f1:b9:f9: 743s ab:c2:35:5c:7f:51:5a:3d:f8:99:4a:66:5d:61:30:de:a7:89: 743s ae:f5:ca:3f:2d:95:5f:4c:1b:f0:2a:f7:0d:17:d6:de:b6:8b: 743s b3:c6:76:45:47:51:fc:e9:73:6d:c0:d6:c2:31:33:72:3e:74: 743s a8:8d:c5:d6:e5:f3:cb:06:b4:40:fd:e3:52:9a:66:1d:ce:e0: 743s 02:33:0a:1e:d5:6f:9c:06:51:3b:df:94:fd:b2:a8:de:40:08: 743s 9a:21:d6:2e:18:ff:bd:07:1f:e7:79:ed:b9:f4:24:a6:be:ef: 743s a6:0f 743s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.config -passin pass:random-root-CA-password-9246 -keyfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 743s Using configuration from /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.config 743s Check that the request matches the signature 743s Signature ok 743s Certificate Details: 743s Serial Number: 3 (0x3) 743s Validity 743s Not Before: Mar 12 13:47:38 2024 GMT 743s Not After : Mar 12 13:47:38 2025 GMT 743s Subject: 743s organizationName = Test Organization 743s organizationalUnitName = Test Organization Unit 743s commonName = Test Organization Root Trusted Certificate 0001 743s X509v3 extensions: 743s X509v3 Authority Key Identifier: 743s F4:CB:1C:EB:2E:B5:0E:23:68:89:6E:B4:A5:E0:C2:DC:92:08:BA:C9 743s X509v3 Basic Constraints: 743s CA:FALSE 743s Netscape Cert Type: 743s SSL Client, S/MIME 743s Netscape Comment: 743s Test Organization Root CA trusted Certificate 743s X509v3 Subject Key Identifier: 743s 9B:84:2C:A0:C8:1D:2B:47:C8:C5:87:A7:7E:49:5C:AF:76:FF:DC:4E 743s X509v3 Key Usage: critical 743s Digital Signature, Non Repudiation, Key Encipherment 743s X509v3 Extended Key Usage: 743s TLS Web Client Authentication, E-mail Protection 743s X509v3 Subject Alternative Name: 743s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 743s Certificate is to be certified until Mar 12 13:47:38 2025 GMT (365 days) 743s 743s Write out database with 1 new entries 743s Database updated 743s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 743s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 743s /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem: OK 743s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 743s + local cmd=openssl 743s + shift 743s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 744s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root Trusted Certificate 0001 744s error 20 at 0 depth lookup: unable to get local issuer certificate 744s error /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem: verification failed 744s + cat 744s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-23304 744s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-23304 1024 744s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-23304 -key /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-request.pem 744s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-request.pem 744s Certificate Request: 744s Data: 744s Version: 1 (0x0) 744s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate Trusted Certificate 0001 744s Subject Public Key Info: 744s Public Key Algorithm: rsaEncryption 744s Public-Key: (1024 bit) 744s Modulus: 744s 00:bf:d1:e2:1a:11:dc:51:2d:6c:4c:aa:39:9f:a1: 744s 97:67:ff:48:87:52:ab:e3:69:6b:55:68:73:c6:d1: 744s 82:bb:ca:d2:eb:6d:ab:58:67:fc:01:be:47:11:54: 744s fa:bc:de:0f:fe:b2:d5:79:49:87:ae:af:3d:61:9b: 744s a6:f6:ad:75:62:bb:dd:e9:25:ca:0d:27:c6:8c:75: 744s 39:af:ca:be:79:55:23:8d:a4:46:59:e2:b0:d1:ce: 744s ce:e7:69:6e:64:54:d4:3a:13:34:72:5f:54:18:f4: 744s 23:9a:58:3a:a8:ff:22:f3:6a:48:de:f9:28:b0:94: 744s 81:b5:3f:f2:5a:6b:25:9a:ef 744s Exponent: 65537 (0x10001) 744s Attributes: 744s Requested Extensions: 744s X509v3 Basic Constraints: 744s CA:FALSE 744s Netscape Cert Type: 744s SSL Client, S/MIME 744s Netscape Comment: 744s Test Organization Intermediate CA trusted Certificate 744s X509v3 Subject Key Identifier: 744s 7C:A8:62:72:01:55:F7:D5:C0:8D:4F:FD:F6:85:3A:51:86:C1:54:E0 744s X509v3 Key Usage: critical 744s Digital Signature, Non Repudiation, Key Encipherment 744s X509v3 Extended Key Usage: 744s TLS Web Client Authentication, E-mail Protection 744s X509v3 Subject Alternative Name: 744s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 744s Signature Algorithm: sha256WithRSAEncryption 744s Signature Value: 744s 74:e0:e0:c7:f6:b1:a9:01:de:ca:3c:8a:9b:86:0c:47:07:5b: 744s 62:b3:01:49:06:ba:eb:ae:f8:83:8c:b9:a7:82:22:6d:92:c9: 744s c4:87:f2:3e:33:f1:18:b1:0c:e6:7e:88:41:8e:69:03:0e:af: 744s 8b:d1:3b:0d:22:d6:3c:09:e5:54:e7:9d:6d:7e:4f:76:d6:54: 744s 65:eb:47:6a:4e:5d:9a:eb:41:d4:6e:c8:fd:81:17:f3:dc:ec: 744s 12:77:b0:bf:a8:30:fb:27:34:88:00:42:9d:ef:fd:ba:ba:0d: 744s a0:3b:05:08:08:13:39:93:20:b0:39:15:94:fb:8d:ff:f1:2e: 744s 5a:f2 744s + openssl ca -passin pass:random-intermediate-CA-password-11173 -config /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s Using configuration from /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.config 744s Check that the request matches the signature 744s Signature ok 744s Certificate Details: 744s Serial Number: 4 (0x4) 744s Validity 744s Not Before: Mar 12 13:47:39 2024 GMT 744s Not After : Mar 12 13:47:39 2025 GMT 744s Subject: 744s organizationName = Test Organization 744s organizationalUnitName = Test Organization Unit 744s commonName = Test Organization Intermediate Trusted Certificate 0001 744s X509v3 extensions: 744s X509v3 Authority Key Identifier: 744s 0B:E0:0F:24:DE:3B:B5:62:16:F6:8E:35:D5:D3:25:EF:A9:D3:F9:C0 744s X509v3 Basic Constraints: 744s CA:FALSE 744s Netscape Cert Type: 744s SSL Client, S/MIME 744s Netscape Comment: 744s Test Organization Intermediate CA trusted Certificate 744s X509v3 Subject Key IdentifierThis certificate should not be trusted fully 744s : 744s 7C:A8:62:72:01:55:F7:D5:C0:8D:4F:FD:F6:85:3A:51:86:C1:54:E0 744s X509v3 Key Usage: critical 744s Digital Signature, Non Repudiation, Key Encipherment 744s X509v3 Extended Key Usage: 744s TLS Web Client Authentication, E-mail Protection 744s X509v3 Subject Alternative Name: 744s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 744s Certificate is to be certified until Mar 12 13:47:39 2025 GMT (365 days) 744s 744s Write out database with 1 new entries 744s Database updated 744s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s + echo 'This certificate should not be trusted fully' 744s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s + local cmd=openssl 744s + shift 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 744s error 2 at 1 depth lookup: unable to get issuer certificate 744s error /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 744s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem: OK 744s + cat 744s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31899 744s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-31899 1024 744s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31899 -key /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 744s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 744s Certificate Request: 744s Data: 744s Version: 1 (0x0) 744s Subject: O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 744s Subject Public Key Info: 744s Public Key Algorithm: rsaEncryption 744s Public-Key: (1024 bit) 744s Modulus: 744s 00:9d:72:19:c7:d2:59:8d:64:27:c3:67:25:ea:7c: 744s c4:2f:09:e5:68:9f:4f:e4:d7:56:a5:84:33:89:60: 744s a4:33:4f:7f:a9:47:75:92:f1:d4:f9:3b:11:cd:10: 744s ee:d5:57:e5:d5:a9:e7:74:1a:74:60:7b:28:03:71: 744s a3:dc:32:59:54:77:81:34:76:9c:b8:8d:46:e0:74: 744s b9:2a:c2:8d:3c:36:95:c1:59:f9:9a:7d:03:0b:dc: 744s 68:84:84:67:90:9e:f4:8a:a9:05:1a:8a:72:b1:c7: 744s 46:36:c0:f5:91:24:31:0b:7a:38:ca:05:8f:ba:48: 744s 16:8d:bc:11:ab:d1:7d:dc:bd 744s Exponent: 65537 (0x10001) 744s Attributes: 744s Requested Extensions: 744s X509v3 Basic Constraints: 744s CA:FALSE 744s Netscape Cert Type: 744s SSL Client, S/MIME 744s Netscape Comment: 744s Test Organization Sub Intermediate CA trusted Certificate 744s X509v3 Subject Key Identifier: 744s 86:87:67:DB:AE:F8:E1:8E:F1:24:24:69:F6:51:DF:A0:E7:D4:77:DF 744s X509v3 Key Usage: critical 744s Digital Signature, Non Repudiation, Key Encipherment 744s X509v3 Extended Key Usage: 744s TLS Web Client Authentication, E-mail Protection 744s X509v3 Subject Alternative Name: 744s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 744s Signature Algorithm: sha256WithRSAEncryption 744s Signature Value: 744s 5b:fe:f1:a0:21:52:1c:69:61:2e:c4:d5:64:df:d1:9c:16:e9: 744s 2d:ee:ec:eb:cb:f6:41:7e:63:25:d3:12:42:82:54:dd:a2:65: 744s dc:8b:19:b3:07:30:91:4e:18:d4:1b:49:2a:dc:75:1e:00:a8: 744s cb:ff:36:ed:90:d6:c0:59:4d:f2:65:63:eb:4b:c1:aa:45:d2: 744s 37:01:15:da:a3:19:56:03:fa:e9:66:2e:e6:f2:a3:ae:dc:4b: 744s 12:9b:02:7d:ee:39:d3:13:68:52:d6:0e:06:0b:c2:c5:6b:d1: 744s 45:78:ea:43:21:19:e3:3d:63:32:90:98:26:bb:6f:5a:59:01: 744s 6e:f9 744s + openssl ca -passin pass:random-sub-intermediate-CA-password-18712 -config /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s Using configuration from /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.config 744s Check that the request matches the signature 744s Signature ok 744s Certificate Details: 744s Serial Number: 5 (0x5) 744s Validity 744s Not Before: Mar 12 13:47:39 2024 GMT 744s Not After : Mar 12 13:47:39 2025 GMT 744s Subject: 744s organizationName = Test Organization 744s organizationalUnitName = Test Organization Unit 744s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 744s X509v3 extensions: 744s X509v3 Authority Key Identifier: 744s 81:65:B0:35:59:E9:3A:8A:C6:3A:E7:75:A3:1A:10:B7:DD:4C:96:C6 744s X509v3 Basic Constraints: 744s CA:FALSE 744s Netscape Cert Type: 744s SSL Client, S/MIME 744s Netscape Comment: 744s Test Organization Sub Intermediate CA trusted Certificate 744s X509v3 Subject Key Identifier: 744s 86:87:67:DB:AE:F8:E1:8E:F1:24:24:69:F6:51:DF:A0:E7:D4:77:DF 744s X509v3 Key Usage: critical 744s Digital Signature, Non Repudiation, Key Encipherment 744s X509v3 Extended Key Usage: 744s TLS Web Client Authentication, E-mail Protection 744s X509v3 Subject Alternative Name: 744s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 744s Certificate is to be certified until Mar 12 13:47:39 2025 GMT (365 days) 744s 744s Write out database with 1 new entries 744s Database updated 744s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s + echo 'This certificate should not be trusted fully' 744s This certificate should not be trusted fully 744s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s + local cmd=openssl 744s + shift 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 744s error 2 at 1 depth lookup: unable to get issuer certificate 744s error /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 744s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s + local cmd=openssl 744s + shift 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 744s error 20 at 0 depth lookup: unable to get local issuer certificate 744s error /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 744s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 744s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s + local cmd=openssl 744s + shift 744s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate Trusted Certificate 0001 744s error 20 at 0 depth lookup: unable to get local issuer certificate 744s error /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 744s Building a the full-chain CA file... 744s + echo 'Building a the full-chain CA file...' 744s + cat /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 744s + cat /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem 744s + cat /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 744s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem 744s + openssl pkcs7 -print_certs -noout 744s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 744s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 744s 744s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 744s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Root CA 744s 744s subject=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Sub Intermediate CA 744s issuer=O = Test Organization, OU = Test Organization Unit, CN = Test Organization Intermediate CA 744s 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA.pem: OK 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem: OK 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem: OK 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-root-intermediate-chain-CA.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-root-intermediate-chain-CA.pem: OK 744s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 744s /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 744s Certificates generation completed! 744s + echo 'Certificates generation completed!' 744s + [[ -v NO_SSSD_TESTS ]] 744s + [[ -v GENERATE_SMART_CARDS ]] 744s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-749 744s + local certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 744s + local key_pass=pass:random-root-ca-trusted-cert-0001-749 744s + local key_cn 744s + local key_name 744s + local tokens_dir 744s + local output_cert_file 744s + token_name= 744s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem .pem 744s + key_name=test-root-CA-trusted-certificate-0001 744s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem 744s ++ sed -n 's/ *commonName *= //p' 744s + key_cn='Test Organization Root Trusted Certificate 0001' 744s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 744s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf 744s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf 744s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 744s + tokens_dir=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001 744s + token_name='Test Organization Root Tr Token' 744s + '[' '!' -e /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 744s + local key_file 744s + local decrypted_key 744s + mkdir -p /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001 744s + key_file=/tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key.pem 744s + decrypted_key=/tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 744s + cat 744s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 744s Slot 0 has a free/uninitialized token. 744s The token has been initialized and is reassigned to slot 1585315764 744s + softhsm2-util --show-slots 744s Available slots: 744s Slot 1585315764 744s Slot info: 744s Description: SoftHSM slot ID 0x5e7dffb4 744s Manufacturer ID: SoftHSM project 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Token present: yes 744s Token info: 744s Manufacturer ID: SoftHSM project 744s Model: SoftHSM v2 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Serial number: 44959bebde7dffb4 744s Initialized: yes 744s User PIN init.: yes 744s Label: Test Organization Root Tr Token 744s Slot 1 744s Slot info: 744s Description: SoftHSM slot ID 0x1 744s Manufacturer ID: SoftHSM project 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Token present: yes 744s Token info: 744s Manufacturer ID: SoftHSM project 744s Model: SoftHSM v2 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Serial number: 744s Initialized: no 744s User PIN init.: no 744s Label: 744s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 744s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-749 -in /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 744s writing RSA key 744s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 744s + rm /tmp/sssd-softhsm2-certs-QGcJD2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 744s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 744s Object 0: 744s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=44959bebde7dffb4;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 744s Type: X.509 Certificate (RSA-1024) 744s Expires: Wed Mar 12 13:47:38 2025 744s Label: Test Organization Root Trusted Certificate 0001 744s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 744s 744s Test Organization Root Tr Token 744s + echo 'Test Organization Root Tr Token' 744s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-23304 744s + local certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-23304 744s + local key_cn 744s + local key_name 744s + local tokens_dir 744s + local output_cert_file 744s + token_name= 744s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem .pem 744s + key_name=test-intermediate-CA-trusted-certificate-0001 744s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem 744s ++ sed -n 's/ *commonName *= //p' 744s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 744s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 744s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 744s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 744s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 744s + tokens_dir=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001 744s + token_name='Test Organization Interme Token' 744s + '[' '!' -e /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 744s + local key_file 744s + local decrypted_key 744s + mkdir -p /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-intermediate-CA-trusted-certificate-0001 744s + key_file=/tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key.pem 744s + decrypted_key=/tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 744s + cat 744s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 744s Slot 0 has a free/uninitialized token. 744s The token has been initialized and is reassigned to slot 1929384757 744s + softhsm2-util --show-slots 744s Available slots: 744s Slot 1929384757 744s Slot info: 744s Description: SoftHSM slot ID 0x73001335 744s Manufacturer ID: SoftHSM project 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Token present: yes 744s Token info: 744s Manufacturer ID: SoftHSM project 744s Model: SoftHSM v2 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Serial number: d25753daf3001335 744s Initialized: yes 744s User PIN init.: yes 744s Label: Test Organization Interme Token 744s Slot 1 744s Slot info: 744s Description: SoftHSM slot ID 0x1 744s Manufacturer ID: SoftHSM project 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Token present: yes 744s Token info: 744s Manufacturer ID: SoftHSM project 744s Model: SoftHSM v2 744s Hardware version: 2.6 744s Firmware version: 2.6 744s Serial number: 744s Initialized: no 744s User PIN init.: no 744s Label: 744s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 745s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-23304 -in /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 745s writing RSA key 745s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 745s + rm /tmp/sssd-softhsm2-certs-QGcJD2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 745s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 745s Object 0: 745s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d25753daf3001335;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 745s Type: X.509 Certificate (RSA-1024) 745s Expires: Wed Mar 12 13:47:39 2025 745s Label: Test Organization Intermediate Trusted Certificate 0001 745s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 745s 745s + echo 'Test Organization Interme Token' 745s Test Organization Interme Token 745s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-31899 745s + local certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 745s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31899 745s + local key_cn 745s + local key_name 745s + local tokens_dir 745s + local output_cert_file 745s + token_name= 745s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 745s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 745s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem 745s ++ sed -n 's/ *commonName *= //p' 745s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 745s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 745s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 745s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 745s ++ basename /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 745s + tokens_dir=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 745s + token_name='Test Organization Sub Int Token' 745s + '[' '!' -e /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 745s + local key_file 745s + local decrypted_key 745s + mkdir -p /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 745s + key_file=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 745s + decrypted_key=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 745s + cat 745s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 745s Slot 0 has a free/uninitialized token. 745s The token has been initialized and is reassigned to slot 1772491803 745s + softhsm2-util --show-slots 745s Available slots: 745s Slot 1772491803 745s Slot info: 745s Description: SoftHSM slot ID 0x69a6141b 745s Manufacturer ID: SoftHSM project 745s Hardware version: 2.6 745s Firmware version: 2.6 745s Token present: yes 745s Token info: 745s Manufacturer ID: SoftHSM project 745s Model: SoftHSM v2 745s Hardware version: 2.6 745s Firmware version: 2.6 745s Serial number: f56b991569a6141b 745s Initialized: yes 745s User PIN init.: yes 745s Label: Test Organization Sub Int Token 745s Slot 1 745s Slot info: 745s Description: SoftHSM slot ID 0x1 745s Manufacturer ID: SoftHSM project 745s Hardware version: 2.6 745s Firmware version: 2.6 745s Token present: yes 745s Token info: 745s Manufacturer ID: SoftHSM project 745s Model: SoftHSM v2 745s Hardware version: 2.6 745s Firmware version: 2.6 745s Serial number: 745s Initialized: no 745s User PIN init.: no 745s Label: 745s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 745s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31899 -in /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 745s writing RSA key 745s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 745s + rm /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 745s + p11tool --provider=/usr/lib/aarch64-linux-gnu/softhsm/libsofthsm2.so --list-all 745s Object 0: 745s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=f56b991569a6141b;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 745s Type: X.509 Certificate (RSA-1024) 745s Expires: Wed Mar 12 13:47:39 2025 745s Label: Test Organization Sub Intermediate Trusted Certificate 0001 745s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 745s 745s + echo 'Test Organization Sub Int Token' 745s Test Organization Sub Int Token 745s + echo 'Certificates generation completed!' 745s + exit 0 745s Certificates generation completed! 745s + find /tmp/sssd-softhsm2-certs-QGcJD2 -type d -exec chmod 777 '{}' ';' 745s + find /tmp/sssd-softhsm2-certs-QGcJD2 -type f -exec chmod 666 '{}' ';' 745s + backup_file /etc/sssd/sssd.conf 745s + '[' -z '' ']' 745s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 745s + backupsdir=/tmp/sssd-softhsm2-backups-8EgSVU 745s + '[' -e /etc/sssd/sssd.conf ']' 745s + delete_paths+=("$1") 745s + rm -f /etc/sssd/sssd.conf 745s ++ runuser -u ubuntu -- sh -c 'echo ~' 745s + user_home=/home/ubuntu 745s + mkdir -p /home/ubuntu 745s + chown ubuntu:ubuntu /home/ubuntu 745s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 745s + user_config=/home/ubuntu/.config 745s + system_config=/etc 745s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 745s + for path_pair in "${softhsm2_conf_paths[@]}" 745s + IFS=: 745s + read -r -a path 745s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 745s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 745s + '[' -z /tmp/sssd-softhsm2-backups-8EgSVU ']' 745s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 745s + delete_paths+=("$1") 745s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 745s + for path_pair in "${softhsm2_conf_paths[@]}" 745s + IFS=: 745s + read -r -a path 745s + path=/etc/softhsm/softhsm2.conf 745s + backup_file /etc/softhsm/softhsm2.conf 745s + '[' -z /tmp/sssd-softhsm2-backups-8EgSVU ']' 745s + '[' -e /etc/softhsm/softhsm2.conf ']' 745s ++ dirname /etc/softhsm/softhsm2.conf 745s + local back_dir=/tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm 745s ++ basename /etc/softhsm/softhsm2.conf 745s + local back_path=/tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm/softhsm2.conf 745s + '[' '!' -e /tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm/softhsm2.conf ']' 745s + mkdir -p /tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm 745s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm/softhsm2.conf 745s + restore_paths+=("$back_path") 745s + rm -f /etc/softhsm/softhsm2.conf 745s + test_authentication login /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem 745s + pam_service=login 745s + certificate_config=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf 745s + ca_db=/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem 745s + verification_options= 745s + mkdir -p -m 700 /etc/sssd 745s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 745s + cat 745s Using CA DB '/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem' with verification options: '' 745s + chmod 600 /etc/sssd/sssd.conf 745s + for path_pair in "${softhsm2_conf_paths[@]}" 745s + IFS=: 745s + read -r -a path 745s + user=ubuntu 745s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 745s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 745s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 745s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 745s + runuser -u ubuntu -- softhsm2-util --show-slots 745s + grep 'Test Organization' 745s + for path_pair in "${softhsm2_conf_paths[@]}" 745s Label: Test Organization Root Tr Token 745s + IFS=: 745s + read -r -a path 745s + user=root 745s + path=/etc/softhsm/softhsm2.conf 745s ++ dirname /etc/softhsm/softhsm2.conf 745s + runuser -u root -- mkdir -p /etc/softhsm 745s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 746s + runuser -u root -- softhsm2-util --show-slots 746s + grep 'Test Organization' 746s + systemctl restart sssd 746s Label: Test Organization Root Tr Token 747s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 748s + for alternative in "${alternative_pam_configs[@]}" 748s + pam-auth-update --enable sss-smart-card-optional 748s # 748s # /etc/pam.d/common-auth - authentication settings common to all services 748s # 748s # This file is included from other service-specific PAM config files, 748s # and should contain a list of the authentication modules that define 748s # the central authentication scheme for use on the system 748s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 748s # traditional Unix authentication mechanisms. 748s # 748s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 748s # To take advantage of this, it is recommended that you configure any 748s # local modules either before or after the default block, and use 748s # pam-auth-update to manage selection of other modules. See 748s # pam-auth-update(8) for details. 748s 748s # here are the per-package modules (the "Primary" block) 748s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 748s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 748s auth [success=1 default=ignore] pam_sss.so use_first_pass 748s # here's the fallback if no module succeeds 748s auth requisite pam_deny.so 748s # prime the stack with a positive return value if there isn't one already; 748s # this avoids us returning an error just because nothing sets a success code 748s # since the modules above will each just jump around 748s auth required pam_permit.so 748s # and here are more per-package modules (the "Additional" block) 748s auth optional pam_cap.so 748s # end of pam-auth-update config 748s + cat /etc/pam.d/common-auth 748s + echo -n -e 123456 748s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 748s pamtester: invoking pam_start(login, ubuntu, ...) 748s pamtester: performing operation - authenticate 748s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 748s + echo -n -e 123456 748s + runuser -u ubuntu -- pamtester -v login '' authenticate 748s pamtester: invoking pam_start(login, , ...) 748s pamtester: performing operation - authenticate 748s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 748s + echo -n -e wrong123456 748s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 748s pamtester: invoking pam_start(login, ubuntu, ...) 748s pamtester: performing operation - authenticate 750s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 750s + echo -n -e wrong123456 750s + runuser -u ubuntu -- pamtester -v login '' authenticate 750s pamtester: invoking pam_start(login, , ...) 750s pamtester: performing operation - authenticate 754s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 754s + echo -n -e 123456 754s + pamtester -v login root authenticate 754s pamtester: invoking pam_start(login, root, ...) 754s pamtester: performing operation - authenticate 757s Password: pamtester: Authentication failure 757s + for alternative in "${alternative_pam_configs[@]}" 757s + pam-auth-update --enable sss-smart-card-required 757s PAM configuration 757s ----------------- 757s 757s Incompatible PAM profiles selected. 757s 757s The following PAM profiles cannot be used together: 757s 757s SSS required smart card authentication, SSS optional smart card 757s authentication 757s 757s Please select a different set of modules to enable. 757s 757s + cat /etc/pam.d/common-auth 757s # 757s # /etc/pam.d/common-auth - authentication settings common to all services 757s # 757s # This file is included from other service-specific PAM config files, 757s # and should contain a list of the authentication modules that define 757s # the central authentication scheme for use on the system 757s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 757s # traditional Unix authentication mechanisms. 757s # 757s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 757s # To take advantage of this, it is recommended that you configure any 757s # local modules either before or after the default block, and use 757s # pam-auth-update to manage selection of other modules. See 757s # pam-auth-update(8) for details. 757s 757s # here are the per-package modules (the "Primary" block) 757s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 757s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 757s auth [success=1 default=ignore] pam_sss.so use_first_pass 757s # here's the fallback if no module succeeds 757s auth requisite pam_deny.so 757s # prime the stack with a positive return value if there isn't one already; 757s # this avoids us returning an error just because nothing sets a success code 757s # since the modules above will each just jump around 757s auth required pam_permit.so 757s # and here are more per-package modules (the "Additional" block) 757s auth optional pam_cap.so 757s # end of pam-auth-update config 757s + echo -n -e 123456 757s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 757s pamtester: invoking pam_start(login, ubuntu, ...) 757s pamtester: performing operation - authenticate 758s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 758s + echo -n -e 123456 758s + runuser -u ubuntu -- pamtester -v login '' authenticate 758s pamtester: invoking pam_start(login, , ...) 758s pamtester: performing operation - authenticate 758s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 758s + echo -n -e wrong123456 758s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 758s pamtester: invoking pam_start(login, ubuntu, ...) 758s pamtester: performing operation - authenticate 761s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 761s + echo -n -e wrong123456 761s + runuser -u ubuntu -- pamtester -v login '' authenticate 761s pamtester: invoking pam_start(login, , ...) 761s pamtester: performing operation - authenticate 764s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 764s + echo -n -e 123456 764s + pamtester -v login root authenticate 764s pamtester: invoking pam_start(login, root, ...) 764s pamtester: performing operation - authenticate 767s pamtester: Authentication service cannot retrieve authentication info 767s + test_authentication login /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem 767s + pam_service=login 767s + certificate_config=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 767s + ca_db=/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem 767s + verification_options= 767s + mkdir -p -m 700 /etc/sssd 767s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 767s + cat 767s Using CA DB '/tmp/sssd-softhsm2-certs-QGcJD2/test-full-chain-CA.pem' with verification options: '' 767s + chmod 600 /etc/sssd/sssd.conf 767s + for path_pair in "${softhsm2_conf_paths[@]}" 767s + IFS=: 767s + read -r -a path 767s + user=ubuntu 767s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 767s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 767s Label: Test Organization Sub Int Token 767s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 767s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 767s + runuser -u ubuntu -- softhsm2-util --show-slots 767s + grep 'Test Organization' 767s + for path_pair in "${softhsm2_conf_paths[@]}" 767s + IFS=: 767s + read -r -a path 767s + user=root 767s + path=/etc/softhsm/softhsm2.conf 767s ++ dirname /etc/softhsm/softhsm2.conf 767s + runuser -u root -- mkdir -p /etc/softhsm 767s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 767s + runuser -u root -- softhsm2-util --show-slots 767s + grep 'Test Organization' 767s + systemctl restart sssd 767s Label: Test Organization Sub Int Token 767s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 768s + for alternative in "${alternative_pam_configs[@]}" 768s + pam-auth-update --enable sss-smart-card-optional 768s + cat /etc/pam.d/common-auth 768s # 768s # /etc/pam.d/common-auth - authentication settings common to all services 768s # 768s # This file is included from other service-specific PAM config files, 768s # and should contain a list of the authentication modules that define 768s # the central authentication scheme for use on the system 768s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 768s # traditional Unix authentication mechanisms. 768s # 768s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 768s # To take advantage of this, it is recommended that you configure any 768s # local modules either before or after the default block, and use 768s # pam-auth-update to manage selection of other modules. See 768s # pam-auth-update(8) for details. 768s 768s # here are the per-package modules (the "Primary" block) 768s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 768s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 768s auth [success=1 default=ignore] pam_sss.so use_first_pass 768s # here's the fallback if no module succeeds 768s auth requisite pam_deny.so 768s # prime the stack with a positive return value if there isn't one already; 768s # this avoids us returning an error just because nothing sets a success code 768s # since the modules above will each just jump around 768s auth required pam_permit.so 768s # and here are more per-package modules (the "Additional" block) 768s auth optional pam_cap.so 768s # end of pam-auth-update config 768s + echo -n -e 123456 768s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 768s pamtester: invoking pam_start(login, ubuntu, ...) 768s pamtester: performing operation - authenticate 768s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 768s + echo -n -e 123456 768s + runuser -u ubuntu -- pamtester -v login '' authenticate 768s pamtester: invoking pam_start(login, , ...) 768s pamtester: performing operation - authenticate 768s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 768s + echo -n -e wrong123456 768s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 768s pamtester: invoking pam_start(login, ubuntu, ...) 768s pamtester: performing operation - authenticate 771s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 771s + echo -n -e wrong123456 771s + runuser -u ubuntu -- pamtester -v login '' authenticate 771s pamtester: invoking pam_start(login, , ...) 771s pamtester: performing operation - authenticate 774s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 774s + echo -n -e 123456 774s + pamtester -v login root authenticate 774s pamtester: invoking pam_start(login, root, ...) 774s pamtester: performing operation - authenticate 776s Password: pamtester: Authentication failure 776s + for alternative in "${alternative_pam_configs[@]}" 776s + pam-auth-update --enable sss-smart-card-required 777s PAM configuration 777s ----------------- 777s 777s Incompatible PAM profiles selected. 777s 777s The following PAM profiles cannot be used together: 777s 777s SSS required smart card authentication, SSS optional smart card 777s authentication 777s 777s Please select a different set of modules to enable. 777s 777s + cat /etc/pam.d/common-auth 777s # 777s # /etc/pam.d/common-auth - authentication settings common to all services 777s # 777s # This file is included from other service-specific PAM config files, 777s # and should contain a list of the authentication modules that define 777s # the central authentication scheme for use on the system 777s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 777s # traditional Unix authentication mechanisms. 777s # 777s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 777s # To take advantage of this, it is recommended that you configure any 777s # local modules either before or after the default block, and use 777s # pam-auth-update to manage selection of other modules. See 777s # pam-auth-update(8) for details. 777s 777s # here are the per-package modules (the "Primary" block) 777s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 777s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 777s auth [success=1 default=ignore] pam_sss.so use_first_pass 777s # here's the fallback if no module succeeds 777s auth requisite pam_deny.so 777s # prime the stack with a positive return value if there isn't one already; 777s # this avoids us returning an error just because nothing sets a success code 777s # since the modules above will each just jump around 777s auth required pam_permit.so 777s # and here are more per-package modules (the "Additional" block) 777s auth optional pam_cap.so 777s # end of pam-auth-update config 777s + echo -n -e 123456 777s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 777s pamtester: invoking pam_start(login, ubuntu, ...) 777s pamtester: performing operation - authenticate 778s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 778s + echo -n -e 123456 778s + runuser -u ubuntu -- pamtester -v login '' authenticate 778s pamtester: invoking pam_start(login, , ...) 778s pamtester: performing operation - authenticate 778s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 778s + echo -n -e wrong123456 778s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 778s pamtester: invoking pam_start(login, ubuntu, ...) 778s pamtester: performing operation - authenticate 780s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 780s + echo -n -e wrong123456 780s + runuser -u ubuntu -- pamtester -v login '' authenticate 780s pamtester: invoking pam_start(login, , ...) 780s pamtester: performing operation - authenticate 783s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 783s + echo -n -e 123456 783s + pamtester -v login root authenticate 783s pamtester: invoking pam_start(login, root, ...) 783s pamtester: performing operation - authenticate 785s pamtester: Authentication service cannot retrieve authentication info 785s + test_authentication login /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem partial_chain 785s + pam_service=login 785s + certificate_config=/tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 785s + ca_db=/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem 785s + verification_options=partial_chain 785s + mkdir -p -m 700 /etc/sssd 785s Using CA DB '/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 785s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-QGcJD2/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 785s + cat 785s + chmod 600 /etc/sssd/sssd.conf 785s + for path_pair in "${softhsm2_conf_paths[@]}" 785s + IFS=: 785s Label: Test Organization Sub Int Token 785s + read -r -a path 785s + user=ubuntu 785s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 785s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 785s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 785s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 785s + runuser -u ubuntu -- softhsm2-util --show-slots 785s + grep 'Test Organization' 785s + for path_pair in "${softhsm2_conf_paths[@]}" 785s + IFS=: 785s + read -r -a path 785s + user=root 785s + path=/etc/softhsm/softhsm2.conf 785s ++ dirname /etc/softhsm/softhsm2.conf 785s + runuser -u root -- mkdir -p /etc/softhsm 785s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-QGcJD2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 785s + runuser -u root -- softhsm2-util --show-slots 785s + grep 'Test Organization' 785s Label: Test Organization Sub Int Token 785s + systemctl restart sssd 786s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 786s + for alternative in "${alternative_pam_configs[@]}" 786s + pam-auth-update --enable sss-smart-card-optional 786s + cat /etc/pam.d/common-auth 786s # 786s # /etc/pam.d/common-auth - authentication settings common to all services 786s # 786s # This file is included from other service-specific PAM config files, 786s # and should contain a list of the authentication modules that define 786s # the central authentication scheme for use on the system 786s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 786s # traditional Unix authentication mechanisms. 786s # 786s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 786s # To take advantage of this, it is recommended that you configure any 786s # local modules either before or after the default block, and use 786s # pam-auth-update to manage selection of other modules. See 786s # pam-auth-update(8) for details. 786s 786s # here are the per-package modules (the "Primary" block) 786s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 786s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 786s auth [success=1 default=ignore] pam_sss.so use_first_pass 786s # here's the fallback if no module succeeds 786s auth requisite pam_deny.so 786s # prime the stack with a positive return value if there isn't one already; 786s # this avoids us returning an error just because nothing sets a success code 786s # since the modules above will each just jump around 786s auth required pam_permit.so 786s # and here are more per-package modules (the "Additional" block) 786s auth optional pam_cap.so 786s # end of pam-auth-update config 786s + echo -n -e 123456 786s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 786s pamtester: invoking pam_start(login, ubuntu, ...) 786s pamtester: performing operation - authenticate 786s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 786s + echo -n -e 123456 786s + runuser -u ubuntu -- pamtester -v login '' authenticate 786s pamtester: invoking pam_start(login, , ...) 786s pamtester: performing operation - authenticate 786s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 786s + echo -n -e wrong123456 786s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 786s pamtester: invoking pam_start(login, ubuntu, ...) 786s pamtester: performing operation - authenticate 789s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 789s + echo -n -e wrong123456 789s + runuser -u ubuntu -- pamtester -v login '' authenticate 789s pamtester: invoking pam_start(login, , ...) 789s pamtester: performing operation - authenticate 792s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 792s + echo -n -e 123456 792s + pamtester -v login root authenticate 792s pamtester: invoking pam_start(login, root, ...) 792s pamtester: performing operation - authenticate 796s Password: pamtester: Authentication failure 796s + for alternative in "${alternative_pam_configs[@]}" 796s + pam-auth-update --enable sss-smart-card-required 796s PAM configuration 796s ----------------- 796s 796s Incompatible PAM profiles selected. 796s 796s The following PAM profiles cannot be used together: 796s 796s SSS required smart card authentication, SSS optional smart card 796s authentication 796s 796s Please select a different set of modules to enable. 796s 796s + cat /etc/pam.d/common-auth 796s # 796s # /etc/pam.d/common-auth - authentication settings common to all services 796s # 796s # This file is included from other service-specific PAM config files, 796s # and should contain a list of the authentication modules that define 796s # the central authentication scheme for use on the system 796s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 796s # traditional Unix authentication mechanisms. 796s # 796s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 796s # To take advantage of this, it is recommended that you configure any 796s # local modules either before or after the default block, and use 796s # pam-auth-update to manage selection of other modules. See 796s # pam-auth-update(8) for details. 796s 796s # here are the per-package modules (the "Primary" block) 796s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 796s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 796s auth [success=1 default=ignore] pam_sss.so use_first_pass 796s # here's the fallback if no module succeeds 796s auth requisite pam_deny.so 796s # prime the stack with a positive return value if there isn't one already; 796s # this avoids us returning an error just because nothing sets a success code 796s # since the modules above will each just jump around 796s auth required pam_permit.so 796s # and here are more per-package modules (the "Additional" block) 796s auth optional pam_cap.so 796s # end of pam-auth-update config 796s + echo -n -e 123456 796s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 797s pamtester: invoking pam_start(login, ubuntu, ...) 797s pamtester: performing operation - authenticate 797s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 797s + echo -n -e 123456 797s + runuser -u ubuntu -- pamtester -v login '' authenticate 797s pamtester: invoking pam_start(login, , ...) 797s pamtester: performing operation - authenticate 797s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 797s + echo -n -e wrong123456 797s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 797s pamtester: invoking pam_start(login, ubuntu, ...) 797s pamtester: performing operation - authenticate 800s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 800s + echo -n -e wrong123456 800s + runuser -u ubuntu -- pamtester -v login '' authenticate 800s pamtester: invoking pam_start(login, , ...) 800s pamtester: performing operation - authenticate 802s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 803s + echo -n -e 123456 803s + pamtester -v login root authenticate 803s pamtester: invoking pam_start(login, root, ...) 803s pamtester: performing operation - authenticate 806s pamtester: Authentication service cannot retrieve authentication info 806s + handle_exit 806s + exit_code=0 806s + restore_changes 806s + for path in "${restore_paths[@]}" 806s + local original_path 806s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-8EgSVU /tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm/softhsm2.conf 806s + original_path=/etc/softhsm/softhsm2.conf 806s + rm /etc/softhsm/softhsm2.conf 806s + mv /tmp/sssd-softhsm2-backups-8EgSVU//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 806s + for path in "${delete_paths[@]}" 806s + rm -f /etc/sssd/sssd.conf 806s + for path in "${delete_paths[@]}" 806s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 806s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 807s + '[' -e /etc/sssd/sssd.conf ']' 807s + systemctl stop sssd 808s + '[' -e /etc/softhsm/softhsm2.conf ']' 808s + chmod 600 /etc/softhsm/softhsm2.conf 808s + rm -rf /tmp/sssd-softhsm2-certs-QGcJD2 808s + '[' 0 = 0 ']' 808s + rm -rf /tmp/sssd-softhsm2-backups-8EgSVU 808s + set +x 808s Script completed successfully! 809s autopkgtest [13:48:44]: test sssd-smart-card-pam-auth-configs: -----------------------] 810s sssd-smart-card-pam-auth-configs PASS 810s autopkgtest [13:48:45]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 811s autopkgtest [13:48:46]: @@@@@@@@@@@@@@@@@@@@ summary 811s ldap-user-group-ldap-auth PASS 811s ldap-user-group-krb5-auth PASS 811s sssd-softhism2-certificates-tests.sh PASS 811s sssd-smart-card-pam-auth-configs PASS 837s Creating nova instance adt-noble-arm64-sssd-20240312-133515-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-arm64-server-20240312.img (UUID c534cdfe-c0b7-48c4-b4bf-7376b15156d5)... 837s Creating nova instance adt-noble-arm64-sssd-20240312-133515-juju-7f2275-prod-proposed-migration-environment-2 from image adt/ubuntu-noble-arm64-server-20240312.img (UUID c534cdfe-c0b7-48c4-b4bf-7376b15156d5)...